INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:8324a400 r4:8324a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fe38c r4:857fe000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fe38c r4:830cd080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ed34 r7:df819d50 r6:830cd100 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830cb0c0 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 94858000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/1:2:1470 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:1470 tgid:1470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead01d84 r8:00000002 r7:60000013 r6:ead01d8c r5:83bc9800 r4:83bc9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83bc9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850873c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83bc9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fdf8c r4:857fdc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fdf8c r4:841b8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83bc9800 r8:841b83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:841b8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841b8380 r8:8027ed34 r7:df925e60 r6:841b8400 r5:83bc9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead01fb0 to 0xead01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83da5080 INFO: task kworker/1:2:1470 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95061000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:0:3101 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3101 tgid:3101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df97dd84 r8:00000002 r7:60000113 r6:df97dd8c r5:84434800 r4:84434800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84434800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df97de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ad780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84434800 r7:00000000 r6:83018000 r5:00001000 r4:7f5ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee099000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dd9b8c r4:85dd9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85dd9b8c r4:84667480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84434800 r8:846674ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84667480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84667480 r8:8027ed34 r7:df911e60 r6:8476cc80 r5:84434800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf97dfb0 to 0xdf97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83c3ac80 INFO: task kworker/0:0:3101 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95471000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/1:1:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df981d84 r8:00000002 r7:60000113 r6:df981d8c r5:84431800 r4:84431800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84431800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84431800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec79b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fc78c r4:857fc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fc78c r4:8476ce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84431800 r8:8476ce2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476ce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ce00 r8:8027ed34 r7:ead01e60 r6:8476cf00 r5:84431800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477e080 INFO: task kworker/1:1:3123 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95471000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/1:4:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9a9d84 r8:00000002 r7:60000113 r6:df9a9d8c r5:8442d400 r4:8442d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8442d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8442d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500478c r4:85004400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500478c r4:8476ce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8442d400 r8:8476ceac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476ce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ce80 r8:8027ed34 r7:df981e60 r6:84667b80 r5:8442d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477e240 INFO: task kworker/1:4:3128 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95845000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:6:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:83af6c00 r4:83af6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd4800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83af6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff19000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba3b8c r4:84ba3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ba3b8c r4:83349800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af6c00 r8:8334982c r7:82804d40 r6:dddced40 r5:dddced60 r4:83349800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349800 r8:8027ed34 r7:df921e60 r6:83349880 r5:83af6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9cdfb0 to 0xdf9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763640 INFO: task kworker/0:6:3137 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95845000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:7:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:83af0000 r4:83af0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83af0000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe49000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dc78c r4:850dc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850dc78c r4:83dc4980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af0000 r8:83dc49ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83dc4980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83dc4980 r8:8027ed34 r7:df9cde60 r6:83937480 r5:83af0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847638c0 INFO: task kworker/0:7:3139 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95c4b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:8:3140 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83af5400 r4:83af5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c84c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83af5400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dcf8c r4:850dcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850dcf8c r4:83a05680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af5400 r8:83a056ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83a05680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83a05680 r8:8027ed34 r7:df9e1e60 r6:832d2c00 r5:83af5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847638c0 INFO: task kworker/0:8:3140 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 95c4b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/1:5:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:83af0c00 r4:83af0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83af0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec78d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fc38c r4:857fc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fc38c r4:8476cd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af0c00 r8:8476cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476cd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476cd80 r8:8027ed34 r7:df981e60 r6:832d2b80 r5:83af0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477ea40 INFO: task kworker/1:5:3143 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9629f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 INFO: task kworker/0:9:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:83af3c00 r4:83af3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83af3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83af3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512e38c r4:8512e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8512e38c r4:84221700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af3c00 r8:8422172c r7:82804d40 r6:dddced40 r5:dddced60 r4:84221700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84221700 r8:8027ed34 r7:df9d9e60 r6:830b8780 r5:83af3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763f40 INFO: task kworker/0:9:3144 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 965a1000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3147 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:838bec00 r4:838bec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838bec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e5840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb87000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dd78c r4:850dd400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850dd78c r4:830b8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838bec00 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ed34 r7:df9d9e60 r6:830b8480 r5:838bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763dc0 INFO: task kworker/0:10:3147 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 965a1000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3150 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:838bb000 r4:838bb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838bb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ccd00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527fb8c r4:8527f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527fb8c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838bb000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:dfa01e60 r6:847dae00 r5:838bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a280 INFO: task kworker/0:11:3150 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 968d4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3151 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:840a2400 r4:840a2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478a000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527ef8c r4:8527ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527ef8c r4:8478e000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a2400 r8:8478e02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e000 r8:8027ed34 r7:dfa15e60 r6:8478e080 r5:840a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a280 INFO: task kworker/0:12:3151 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 96ba5000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3152 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:840a6000 r4:840a6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533f940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a778c r4:852a7400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a778c r4:8478e100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a6000 r8:8478e12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e100 r8:8027ed34 r7:dfa15e60 r6:8478e180 r5:840a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a080 INFO: task kworker/0:13:3152 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 96ba5000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3154 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:840a3c00 r4:840a3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a578c r4:852a5400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a578c r4:8478e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a3c00 r8:8478e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e200 r8:8027ed34 r7:dfa2de60 r6:8478e280 r5:840a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a340 INFO: task kworker/0:14:3154 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9701b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3156 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:840a5400 r4:840a5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843265c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a8b8c r4:854a8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a8b8c r4:8478e300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a5400 r8:8478e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e300 r8:8027ed34 r7:dfa2de60 r6:8478e380 r5:840a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a7c0 INFO: task kworker/0:15:3156 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 971bd000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:833c0c00 r4:833c0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833c0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85357040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea91f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85364f8c r4:85364c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85364f8c r4:8478e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833c0c00 r8:8478e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e400 r8:8027ed34 r7:dfa45e60 r6:8478e480 r5:833c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a640 INFO: task kworker/0:16:3158 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 971bd000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:833c3000 r4:833c3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833c3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85357440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85365b8c r4:85365800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85365b8c r4:8478e500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833c3000 r8:8478e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e500 r8:8027ed34 r7:dfa45e60 r6:8478e580 r5:833c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478a980 INFO: task kworker/0:17:3160 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 97526000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3163 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:840a6c00 r4:840a6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84326700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85366f8c r4:85366c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85366f8c r4:8478e600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a6c00 r8:8478e62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e600 r8:8027ed34 r7:dfa45e60 r6:8478e680 r5:840a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478ab40 INFO: task kworker/0:18:3163 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 97526000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3164 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:840a4800 r4:840a4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840a4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a85040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841eef8c r4:841eec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841eef8c r4:8478e700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a4800 r8:8478e72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e700 r8:8027ed34 r7:dfa59e60 r6:8478e780 r5:840a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478ac80 INFO: task kworker/0:19:3164 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 97cd9000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:840db000 r4:840db000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840db000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840db000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae19000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ef38c r4:841ef000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ef38c r4:8478e800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840db000 r8:8478e82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e800 r8:8027ed34 r7:dfa61e60 r6:8478e880 r5:840db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478afc0 INFO: task kworker/0:20:3166 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 97dc3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:840d8c00 r4:840d8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840d8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fe7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555978c r4:85559400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555978c r4:8478e900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840d8c00 r8:8478e92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478e900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478e900 r8:8027ed34 r7:dfa6de60 r6:8478e980 r5:840d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790140 INFO: task kworker/0:21:3168 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 98214000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:8444ec00 r4:8444ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ae4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ef78c r4:841ef400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ef78c r4:8478ea00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444ec00 r8:8478ea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ea00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ea00 r8:8027ed34 r7:dfa75e60 r6:8478ea80 r5:8444ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790100 INFO: task kworker/0:22:3170 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 98309000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3172 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:8444c800 r4:8444c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a8e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb553000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555ab8c r4:8555a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555ab8c r4:8478eb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444c800 r8:8478eb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478eb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478eb00 r8:8027ed34 r7:dfa81e60 r6:8478eb80 r5:8444c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790480 INFO: task kworker/0:23:3172 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 984fa000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:84449800 r4:84449800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84449800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84449800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae93000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558238c r4:85582000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8558238c r4:8478ec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84449800 r8:8478ec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ec00 r8:8027ed34 r7:dfa81e60 r6:8478ec80 r5:84449800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790400 INFO: task kworker/0:24:3174 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9868c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:8444e000 r4:8444e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518fc40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a0f8c r4:857a0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a0f8c r4:8478ed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444e000 r8:8478ed2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ed00 r8:8027ed34 r7:dfa95e60 r6:8478ed80 r5:8444e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847905c0 INFO: task kworker/0:25:3176 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9891c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3178 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa9d84 r8:00000002 r7:60000013 r6:dfaa9d8c r5:8444a400 r4:8444a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444a400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85582b8c r4:85582800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85582b8c r4:8478ee00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444a400 r8:8478ee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ee00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ee00 r8:8027ed34 r7:dfa9de60 r6:8478ee80 r5:8444a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790780 INFO: task kworker/0:26:3178 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 98d39000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:8444bc00 r4:8444bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4a5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb73000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578bf8c r4:8578bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578bf8c r4:8478ef00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444bc00 r8:8478ef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ef00 r8:8027ed34 r7:dfa9de60 r6:8478ef80 r5:8444bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790a80 INFO: task kworker/0:27:3179 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 991ae000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:8444d400 r4:8444d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8444d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8444d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec873000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a3b8c r4:857a3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a3b8c r4:847a7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444d400 r8:847a702c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7000 r8:8027ed34 r7:dfa9de60 r6:847a7080 r5:8444d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790ac0 INFO: task kworker/0:28:3182 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 991ae000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3184 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:84448000 r4:84448000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84448000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84448000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a238c r4:857a2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a238c r4:847a7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84448000 r8:847a712c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7100 r8:8027ed34 r7:dfabde60 r6:847a7180 r5:84448000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790b80 INFO: task kworker/0:29:3184 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 999f1000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3186 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:8446d400 r4:8446d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c53c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8446d400 r7:00000000 r6:83018000 r5:00001000 r4:7f115000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec88b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582178c r4:85821400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8582178c r4:847a7200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446d400 r8:847a722c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7200 r8:8027ed34 r7:dfabde60 r6:847a7280 r5:8446d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790cc0 INFO: task kworker/0:30:3186 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 99acd000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:8446c800 r4:8446c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bc880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8446c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb617000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85812f8c r4:85812c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85812f8c r4:847a7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446c800 r8:847a73ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7380 r8:8027ed34 r7:dfad1e60 r6:847a7400 r5:8446c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790cc0 INFO: task kworker/0:31:3187 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9a148000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3190 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:8446b000 r4:8446b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545bc80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8446b000 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb91000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f238c r4:841f2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f238c r4:847a7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446b000 r8:847a74ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7480 r8:8027ed34 r7:dfad1e60 r6:847a7500 r5:8446b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847af080 INFO: task kworker/0:32:3190 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9a5fc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaedd84 r8:00000002 r7:60000013 r6:dfaedd8c r5:8446bc00 r4:8446bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477f80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8446bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f187000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858dc38c r4:858dc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858dc38c r4:847a7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446bc00 r8:847a75ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7580 r8:8027ed34 r7:dfae5e60 r6:847a7600 r5:8446bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847af180 INFO: task kworker/0:33:3192 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9aa52000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:84468c00 r4:84468c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84468c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854625c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84468c00 r7:00000000 r6:83018000 r5:00001000 r4:7f21b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85503f8c r4:85503c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85503f8c r4:847a7680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84468c00 r8:847a76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7680 r8:8027ed34 r7:dfaede60 r6:847a7700 r5:84468c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847af280 INFO: task kworker/0:34:3194 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9adde000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb05d84 r8:00000002 r7:60000013 r6:dfb05d8c r5:84468000 r4:84468000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84468000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb05e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bf840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84468000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588e38c r4:8588e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588e38c r4:847a7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84468000 r8:847a77ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7780 r8:8027ed34 r7:dfb01e60 r6:847a7800 r5:84468000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb05fb0 to 0xdfb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847af280 INFO: task kworker/0:35:3195 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9adde000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:8446e000 r4:8446e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85169480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8446e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7af000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fcf8c r4:857fcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fcf8c r4:8476cd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446e000 r8:8476cd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476cd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476cd00 r8:8027ed34 r7:df981e60 r6:847a7880 r5:8446e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b1340 INFO: task kworker/1:6:3198 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b101000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:84430000 r4:84430000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84430000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850876c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84430000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857feb8c r4:857fe800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857feb8c r4:8476c980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84430000 r8:8476c9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476c980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476c980 r8:8027ed34 r7:dfb1de60 r6:8476ca00 r5:84430000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b1340 INFO: task kworker/1:7:3201 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b28f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb11d84 r8:00000002 r7:60000013 r6:dfb11d8c r5:84433000 r4:84433000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84433000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84433000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fd78c r4:857fd400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fd78c r4:8476ca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84433000 r8:8476caac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8476ca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8476ca80 r8:8027ed34 r7:dfaf9e60 r6:8476cb00 r5:84433000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b1340 INFO: task kworker/1:8:3202 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b55a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:83bbe000 r4:83bbe000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83bbe000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83bbe000 r7:00000000 r6:83018000 r5:00001000 r4:7f219000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece07000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85502f8c r4:85502c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85502f8c r4:847a7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83bbe000 r8:847a792c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7900 r8:8027ed34 r7:dfb01e60 r6:8476c880 r5:83bbe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847afb80 INFO: task kworker/0:36:3203 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b55a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb49d84 r8:00000002 r7:60000013 r6:dfb49d8c r5:84435400 r4:84435400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84435400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84435400 r7:00000000 r6:83018000 r5:00001000 r4:7f219000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85503b8c r4:85503800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85503b8c r4:847a7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84435400 r8:847a79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7980 r8:8027ed34 r7:dfb01e60 r6:8476c900 r5:84435400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847afac0 INFO: task kworker/0:37:3207 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9b55a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb4dd84 r8:00000002 r7:60000013 r6:dfb4dd8c r5:8323e000 r4:8323e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f459000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf55000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f8f8c r4:841f8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f8f8c r4:847a7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:847a7a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7a00 r8:8027ed34 r7:dfb49e60 r6:8476c800 r5:8323e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847afb80 INFO: task kworker/0:38:3208 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9bde8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3210 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb55d84 r8:00000002 r7:60000113 r6:dfb55d8c r5:832f8c00 r4:832f8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832f8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb55e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545ea80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f283000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec815000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85966f8c r4:85966c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85966f8c r4:847a7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f8c00 r8:847a7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7a80 r8:8027ed34 r7:dfb4de60 r6:8476c700 r5:832f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847afb80 INFO: task kworker/0:39:3210 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9bde8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:832fec00 r4:832fec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832fec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f45b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf73000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f8b8c r4:841f8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f8b8c r4:847a7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832fec00 r8:847a7b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7b00 r8:8027ed34 r7:dfb4de60 r6:8476c780 r5:832fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477edc0 INFO: task kworker/0:40:3212 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9bde8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb79d84 r8:00000002 r7:60000013 r6:dfb79d8c r5:832f8000 r4:832f8000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832f8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb79e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f457000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf2d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f938c r4:841f9000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f938c r4:847a7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f8000 r8:847a7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7b80 r8:8027ed34 r7:dfb4de60 r6:8476c680 r5:832f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb79fb0 to 0xdfb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0100 INFO: task kworker/0:41:3214 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9bde8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3216 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb81d84 r8:00000002 r7:60000013 r6:dfb81d8c r5:849b0000 r4:849b0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841faf8c r4:841fac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841faf8c r4:847a7c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0000 r8:847a7c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7c00 r8:8027ed34 r7:dfb79e60 r6:8476c600 r5:849b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b00c0 INFO: task kworker/0:42:3216 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c1b9000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:849b0c00 r4:849b0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b08c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3df000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecebb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f9b8c r4:841f9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f9b8c r4:847a7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0c00 r8:847a7cac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7c80 r8:8027ed34 r7:dfb81e60 r6:8476c580 r5:849b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b00c0 INFO: task kworker/0:43:3218 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c43e000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3220 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb8dd84 r8:00000002 r7:60000013 r6:dfb8dd8c r5:849b2400 r4:849b2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f3db000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece37000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fa38c r4:841fa000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fa38c r4:847a7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b2400 r8:847a7d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7d00 r8:8027ed34 r7:dfb81e60 r6:8476c280 r5:849b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b02c0 INFO: task kworker/0:44:3220 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c695000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:849b3c00 r4:849b3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3d9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fa78c r4:841fa400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fa78c r4:847a7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3c00 r8:847a7dac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7d80 r8:8027ed34 r7:dfb81e60 r6:8476c500 r5:849b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0400 INFO: task kworker/0:45:3222 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c735000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3224 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:849b1800 r4:849b1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f3d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece03000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fab8c r4:841fa800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fab8c r4:847a7e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b1800 r8:847a7e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7e00 r8:8027ed34 r7:dfb81e60 r6:8476c480 r5:849b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0580 INFO: task kworker/0:46:3224 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9c735000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbadd84 r8:00000002 r7:60000013 r6:dfbadd8c r5:849b4800 r4:849b4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550d500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f3d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fb78c r4:841fb400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fb78c r4:847a7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b4800 r8:847a7eac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7e80 r8:8027ed34 r7:dfb81e60 r6:8476c180 r5:849b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b06c0 INFO: task kworker/0:47:3226 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9cdce000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3228 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:849b6000 r4:849b6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b1200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f3d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fb38c r4:841fb000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fb38c r4:847a7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6000 r8:847a7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7f00 r8:8027ed34 r7:dfbade60 r6:8476c100 r5:849b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0800 INFO: task kworker/0:48:3228 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9cdce000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbc9d84 r8:00000002 r7:60000013 r6:dfbc9d8c r5:849b6c00 r4:849b6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3c9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb63000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fbf8c r4:841fbc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fbf8c r4:847a7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6c00 r8:847a7fac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a7f80 r8:8027ed34 r7:dfbade60 r6:8476c200 r5:849b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0ac0 INFO: task kworker/0:49:3231 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9d046000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3232 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd5d84 r8:00000002 r7:60000013 r6:dfbd5d8c r5:849b5400 r4:849b5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f3cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841fbb8c r4:841fb800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841fbb8c r4:847ba000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b5400 r8:847ba02c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba000 r8:8027ed34 r7:dfbc9e60 r6:8476c380 r5:849b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0d40 INFO: task kworker/0:50:3232 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9d4e3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3235 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:849b3000 r4:849b3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849b3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfb40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f3c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ccb8c r4:849cc800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ccb8c r4:847ba080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3000 r8:847ba0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba080 r8:8027ed34 r7:dfbc9e60 r6:8476c400 r5:849b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0d80 INFO: task kworker/0:51:3235 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9d4e3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3238 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:84831800 r4:84831800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84831800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84831800 r7:00000000 r6:83018000 r5:00001000 r4:7f3c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb0d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cc38c r4:849cc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cc38c r4:847ba100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84831800 r8:847ba12c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba100 r8:8027ed34 r7:dfbdde60 r6:8476c300 r5:84831800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0ec0 INFO: task kworker/0:52:3238 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9d6fb000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3239 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc01d84 r8:00000002 r7:60000013 r6:dfc01d8c r5:84830000 r4:84830000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84830000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfbc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84830000 r7:00000000 r6:83018000 r5:00001000 r4:7f3c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca83000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ccf8c r4:849ccc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ccf8c r4:847ba180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:847ba1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba180 r8:8027ed34 r7:dfbdde60 r6:8476c000 r5:84830000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf080 INFO: task kworker/0:53:3239 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9dafc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3241 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc09d84 r8:00000002 r7:60000013 r6:dfc09d8c r5:84833000 r4:84833000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84833000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84833000 r7:00000000 r6:83018000 r5:00001000 r4:7f3bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cdf8c r4:849cdc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cdf8c r4:847ba200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833000 r8:847ba22c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba200 r8:8027ed34 r7:dfc01e60 r6:8476c080 r5:84833000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf080 INFO: task kworker/0:54:3241 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9dafc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3242 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3242 tgid:3242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:84830c00 r4:84830c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84830c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dc00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84830c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbdf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596738c r4:85967000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596738c r4:847ba280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830c00 r8:847ba2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba280 r8:8027ed34 r7:dfc09e60 r6:84667c00 r5:84830c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf080 INFO: task kworker/0:55:3242 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9dd5d000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3244 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc19d84 r8:00000002 r7:60000013 r6:dfc19d8c r5:84832400 r4:84832400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84832400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84832400 r7:00000000 r6:83018000 r5:00001000 r4:7f3c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca67000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cd38c r4:849cd000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cd38c r4:847ba300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84832400 r8:847ba32c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba300 r8:8027ed34 r7:dfc09e60 r6:845f3380 r5:84832400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf080 INFO: task kworker/0:56:3244 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9e09c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:3246 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:84833c00 r4:84833c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84833c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dbc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84833c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596778c r4:85967400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596778c r4:847ba380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833c00 r8:847ba3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba380 r8:8027ed34 r7:dfc09e60 r6:8458e500 r5:84833c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf300 INFO: task kworker/0:57:3246 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9e09c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3248 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:84834800 r4:84834800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84834800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfdc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84834800 r7:00000000 r6:83018000 r5:00001000 r4:7f3bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca49000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cd78c r4:849cd400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cd78c r4:847ba400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84834800 r8:847ba42c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba400 r8:8027ed34 r7:dfc09e60 r6:84290600 r5:84834800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf440 INFO: task kworker/0:58:3248 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9e774000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3250 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc49d84 r8:00000002 r7:60000013 r6:dfc49d8c r5:84835400 r4:84835400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84835400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfe80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84835400 r7:00000000 r6:83018000 r5:00001000 r4:7f3bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca1b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cdb8c r4:849cd800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cdb8c r4:847ba480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84835400 r8:847ba4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba480 r8:8027ed34 r7:dfc09e60 r6:832a1580 r5:84835400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf800 INFO: task kworker/0:59:3250 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9e774000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3253 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:84a30c00 r4:84a30c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a30c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a30c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ce38c r4:849ce000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ce38c r4:847ba500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a30c00 r8:847ba52c r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba500 r8:8027ed34 r7:dfc09e60 r6:832a1500 r5:84a30c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf640 INFO: task kworker/0:60:3253 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3255 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84a31800 r4:84a31800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a31800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550d380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a31800 r7:00000000 r6:83018000 r5:00001000 r4:7f3b7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849ce78c r4:849ce400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849ce78c r4:847ba580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a31800 r8:847ba5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba580 r8:8027ed34 r7:dfc5de60 r6:832a1480 r5:84a31800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bf640 INFO: task kworker/0:61:3255 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9eed9000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:62 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:84a33c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3b5000 r10:61c88647 r9:84a33c00 r8:847ba62c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 dd60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3259 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc81d84 r8:00000002 r7:60000013 r6:dfc81d8c r5:84a34800 r4:84a34800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a34800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ad840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a34800 r7:00000000 r6:83018000 r5:00001000 r4:7f5af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0a7000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a33000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:849cef8c r4:847ba700 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05dddc0 r4:00000000 r5:84b96f8c r4:84b96c00 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a35400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc99e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550db40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a35400 r7:00000000 r6:83018000 r5:00001000 r4:7f3b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc83000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cc78c r4:849cc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cc78c r4:847ba780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a35400 r8:847ba7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba780 r8:8027ed34 r7:dfc81e60 r6:83da6980 r5:84a35400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc99fb0 to 0xdfc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bfcc0 INFO: task kworker/0:65:3262 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: 9fc12000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/0:66:3264 blocked for more than 452 seconds. r5:84a32400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dec0 r7:dddced40 r6:83018000 r5:85967f8c r4:847ba800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:67:3266 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:67 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:84a36000 r4:84a36000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a36000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550de00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a36000 r7:00000000 r6:83018000 r5:00001000 r4:7f3ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85967b8c r4:85967800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85967b8c r4:847ba880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a36000 r8:847ba8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba880 r8:8027ed34 r7:dfc81e60 r6:847d5000 r5:84a36000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0f80 INFO: task kworker/0:67:3266 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a0402000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r4:e05dddc0 r4:00000000 r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a36c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:841f978c r4:847ba900 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 task:kworker/0:69 state:D stack:0 pid:3271 tgid:3271 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:859fdf8c r4:847ba980 r10:61c88647 r9:84836c00 r8:847ba9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847ba980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba980 r8:8027ed34 r7:dfc81e60 r6:847d5100 r5:84836c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848af100 INFO: task kworker/0:69:3271 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a0f61000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3272 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfafdd84 r8:00000002 r7:60000013 r6:dfafdd8c r5:84a20000 r4:84a20000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a20000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d0d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a20000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a20000 r8:847baa2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:9:3275 blocked for more than 452 seconds. r5:84a21800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a21800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fe78c r4:857fe400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fe78c r4:847d5200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a21800 r8:847d522c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5200 r8:8027ed34 r7:dfaf9e60 r6:847d5280 r5:84a21800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c86c0 INFO: task kworker/1:9:3275 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a1676000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:10:3278 blocked for more than 452 seconds. r5:84a22400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a22400 r8:847d532c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:11:3280 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:8446ec00 r4:8446ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8446ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8446ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ff38c r4:857ff000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857ff38c r4:847d5400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8446ec00 r8:847d542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5400 r8:8027ed34 r7:dfccde60 r6:847baa80 r5:8446ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c85c0 INFO: task kworker/1:11:3280 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:12:3282 blocked for more than 452 seconds. r4:83240c00 r5:83240c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r9:83018205 r8:83240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 task:kworker/1:13 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:83bbec00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087e00 r5:857ffb8c r4:857ff800 r4:847d5500 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c8b40 INFO: task kworker/1:13:3284 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a1e52000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3287 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:8389ec00 r4:8389ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8389ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856adac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8389ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f5b5000 r7:dddced40 r6:83018000 r5:85dda78c r4:847bac00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:14:3288 blocked for more than 452 seconds. r5:8389bc00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087f80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8389bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fff8c r4:857ffc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fff8c r4:847d5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8389bc00 r8:847d55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5580 r8:8027ed34 r7:dfad5e60 r6:847bad00 r5:8389bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce1fb0 to 0xdfce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c8fc0 INFO: task kworker/1:14:3288 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a2334000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:15:3290 blocked for more than 452 seconds. r5:84968000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8580838c r4:847d5600 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: a2334000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:16 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84968c00 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb699000 r10:61c88647 r9:84968c00 r8:847d56ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849c8d40 INFO: task kworker/1:16:3291 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a26ec000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3293 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3293 tgid:3293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:8496a400 r4:8496a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85087a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb477000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580878c r4:85808400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580878c r4:847d5700 r10:00000000 r9:847d5700 r8:8027ed34 r7:dfcede60 r6:847bae80 r5:8496a400 r4:847db0c0 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84a23c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847d5780 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3298 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3298 tgid:3298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:84a24800 r4:84a24800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a24800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a24800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580938c r4:85809000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580938c r4:847d5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a24800 r8:847d58ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5880 r8:8027ed34 r7:dfcede60 r6:847d5900 r5:84a24800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847db300 INFO: task kworker/1:19:3298 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a305a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a25400 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8580978c r4:85809400 r10:61c88647 r9:84a25400 r8:847d59ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd20: a358a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3302 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd01d84 r8:00000002 r7:60000113 r6:dfd01d8c r5:84a26000 r4:84a26000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a26000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb931000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3304 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3304 tgid:3304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd09d84 r8:00000002 r7:60000113 r6:dfd09d8c r5:84a26c00 r4:84a26c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a26c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85809f8c r4:847d5b80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: a3a35000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) Not tainted 6.15.0-syzkaller #0 r4:84a20c00 r5:84a20c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r9:83018205 r8:84a20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8580a78c r4:847d5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a20c00 r8:847d5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5c80 r8:8027ed34 r7:dfd09e60 r6:847d5d00 r5:84a20c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847db840 INFO: task kworker/1:23:3306 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a424c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3308 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:84a23000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a64c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:25:3310 blocked for more than 452 seconds. r10:829187f4 r9:dfd15d84 r8:00000002 r7:60000113 r6:dfd15d8c r5:84469800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:ebaef000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3312 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3312 tgid:3312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd19d84 r8:00000002 r7:60000013 r6:dfd19d8c r5:84a30000 r4:84a30000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a30000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a30000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec42d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580af8c r4:8580ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580af8c r4:847d5f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a30000 r8:847d5fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d5f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d5f80 r8:8027ed34 r7:dfd15e60 r6:84882000 r5:84a30000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847dbc80 INFO: task kworker/1:26:3312 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 dd20: a4a68000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84836000 r5:84836000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6880 r5:8580b38c r4:8580b000 r4:84882080 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfd21d84 r8:00000002 r7:60000113 r6:dfd21d8c r5:84438000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84438000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580b78c r4:8580b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580b78c r4:84882180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84438000 r8:848821ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84882180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84882180 r8:8027ed34 r7:dfd1de60 r6:84882200 r5:84438000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd21fb0 to 0xdfd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84745300 INFO: task kworker/1:28:3316 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a5071000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfd25d84 r8:00000002 r7:60000113 r6:dfd25d8c r5:84438c00 r5:84438c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:84438c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 r10:61c88647 r9:84438c00 r8:848822ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:30 state:D stack:0 pid:3320 tgid:3320 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84439800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a6dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84439800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec611000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580c78c r4:8580c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580c78c r4:84882380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84439800 r8:848823ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84882380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84882380 r8:8027ed34 r7:dfd25e60 r6:84882400 r5:84439800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84745180 INFO: task kworker/1:30:3320 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a57ff000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:8443b000 r5:8443b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8496b000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd31fb0 to 0xdfd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847454c0 INFO: task kworker/1:32:3323 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a5ae4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3326 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3326 tgid:3326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd3dd84 r8:00000002 r7:60000113 r6:dfd3dd8c r5:8496bc00 r4:8496bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b31c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec66b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8580d38c r4:84882680 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3328 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3328 tgid:3328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd45d84 r8:00000002 r7:60000013 r6:dfd45d8c r5:8496e000 r4:8496e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd45e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b3040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec649000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8580cf8c r4:84882700 Exception stack(0xdfd45fb0 to 0xdfd45ff8) r4:84745a40 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3329 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3329 tgid:3329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd49d84 r8:00000002 r7:60000113 r6:dfd49d8c r5:8496ec00 r4:8496ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd49e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b3280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec675000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8580d78c r4:8580d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8580d78c r4:84882780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496ec00 r8:848827ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84882780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84882780 r8:8027ed34 r7:dfd3de60 r6:84792080 r5:8496ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd49fb0 to 0xdfd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84745980 INFO: task kworker/1:35:3329 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a631f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3335 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3335 tgid:3335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfba5d84 r8:00000002 r7:60000013 r6:dfba5d8c r5:8496d400 r4:8496d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b34c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84745d40 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:72 state:D stack:0 pid:3338 tgid:3338 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd39d84 r8:00000002 r7:60000113 r6:dfd39d8c r5:8496c800 r4:8496c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd39e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ad980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8496c800 r7:00000000 r6:83018000 r5:00001000 r4:7f5b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dda38c r4:85dda000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85dda38c r4:84792180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496c800 r8:847921ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84792180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84792180 r8:8027ed34 r7:dfcdde60 r6:84792280 r5:8496c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd39fb0 to 0xdfd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b9680 INFO: task kworker/0:72:3338 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a664a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84960000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856adcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84960000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa67000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ddab8c r4:85dda800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ddab8c r4:84792480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84960000 r8:847924ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84792480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84792480 r8:8027ed34 r7:dfd35e60 r6:84792500 r5:84960000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847b9ac0 Call trace: dd20: a6841000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:3774 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:3774 tgid:3774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05b9d84 r8:00000002 r7:60000013 r6:e05b9d8c r5:84a03000 r4:84a03000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a03000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a03000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500538c r4:85005000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500538c r4:84bcac80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a03000 r8:84bcacac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bcac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcac80 r8:8027ed34 r7:e0541e60 r6:84bdf580 r5:84a03000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b9fb0 to 0xe05b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05ddfb0 to 0xe05ddff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:199:3778 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:199 state:D stack:0 pid:3778 tgid:3778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05bdd84 r8:00000002 r7:60000013 r6:e05bdd8c r5:84a04800 r4:84a04800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a04800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a04800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae9000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84450c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: a7196000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:3791 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05e9d84 r8:00000002 r7:60000113 r6:e05e9d8c r5:84451800 r4:84451800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84451800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84451800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9778c r4:84b97400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9778c r4:84bdfd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84451800 r8:84bdfdac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfd80 r8:8027ed34 r7:e05e5e60 r6:84bdfe00 r5:84451800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e9fb0 to 0xe05e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf5c0 INFO: task kworker/0:134:3791 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 dd60: 800f0013 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:135:3792 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:3792 tgid:3792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05f1d84 r8:00000002 r7:60000013 r6:e05f1d8c r5:84452400 r4:84452400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84452400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84452400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0559000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b97b8c r4:84b97800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b97b8c r4:84bdfe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84452400 r8:84bdfeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfe80 r8:8027ed34 r7:e05e9e60 r6:84bdff00 r5:84452400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f1fb0 to 0xe05f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf980 INFO: task kworker/0:135:3792 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a7b13000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84453000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 800f0013 ffffffff r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:3796 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:3796 tgid:3796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05fdd84 r8:00000002 r7:60000113 r6:e05fdd8c r5:84453c00 r4:84453c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84453c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05fde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbfb40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84453c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0597000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b97f8c r4:84b97c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b97f8c r4:84bb5080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84453c00 r8:84bb50ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb5080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb5080 r8:8027ed34 r7:e05f5e60 r6:84bb5100 r5:84453c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbfc80 INFO: task kworker/0:137:3796 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: dd20: a7b7a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84454800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a7b7a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:3801 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:3801 tgid:3801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84455400 r5:84455400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68040 r5:84ba0b8c r4:84ba0800 r4:84bb5280 Exception stack(0xe0605fb0 to 0xe0605ff8) r4:84bbfe40 Call trace: dd20: a81aa000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05ddfb0 to 0xe05ddff8) r4:84bbf300 INFO: task kworker/0:140:3803 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:3803 tgid:3803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0611d84 r8:00000002 r7:60000113 r6:e0611d8c r5:84456000 r4:84456000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84456000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0611e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b686c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84456000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0635000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba1b8c r4:84ba1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ba1b8c r4:84bb5380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84456000 r8:84bb53ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb5380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb5380 r8:8027ed34 r7:e0605e60 r6:84bb5400 r5:84456000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0611fb0 to 0xe0611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b68280 INFO: task kworker/0:140:3803 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a81aa000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:84b96f8c r4:84b96c00 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 task:kworker/0:141 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84456c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68140 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0619fb0 to 0xe0619ff8) r4:84b68280 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:3807 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:3807 tgid:3807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0625d84 r8:00000002 r7:60000113 r6:e0625d8c r5:84418000 r4:84418000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84418000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0625e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84418000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0621000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba138c r4:84ba1000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ba138c r4:84bb5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84418000 r8:84bb55ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb5580 r8:8027ed34 r7:e0611e60 r6:84bb5600 r5:84418000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0625fb0 to 0xe0625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b68300 INFO: task kworker/0:142:3807 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a867d000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:143 state:D stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84418c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e062f000 r10:61c88647 r9:84418c00 r8:84bb56ac r7:82804d40 r6:dddced40 r5:dddced60 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/0:144:3810 blocked for more than 453 seconds. r10:829187f4 r9:e0601d84 r8:00000002 r7:60000113 r6:e0601d8c r5:84419800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84419800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0643000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba1f8c r4:84ba1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ba1f8c r4:84bb5780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84419800 r8:84bb57ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb5780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb5780 r8:8027ed34 r7:e0611e60 r6:84bb5800 r5:84419800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0601fb0 to 0xe0601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b68400 INFO: task kworker/0:144:3810 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a8fdf000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:3813 blocked for more than 453 seconds. Workqueue: events bpf_prog_free_deferred r5:8441b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68e00 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84ba338c r4:84ba3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ba338c r4:84bb5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8441b000 r8:84bb58ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb5880 r8:8027ed34 r7:e0601e60 r6:84bb5900 r5:8441b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b687c0 INFO: task kworker/0:145:3813 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: a9608000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:3814 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:3814 tgid:3814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e064dd84 r8:00000002 r7:60000113 r6:e064dd8c r5:8441bc00 r4:8441bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8441bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8441bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0649000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba238c r4:84ba2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ba238c r4:84bb5980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8441bc00 r8:84bb59ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb5980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb5980 r8:8027ed34 r7:e0641e60 r6:84bb5a00 r5:8441bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe064dfb0 to 0xe064dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8441c800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:8441c800 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:61c88647 r9:8441c800 r8:84bb5aac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 800f0013 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:148:3822 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:148 state:D stack:0 pid:3822 tgid:3822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e04d9d84 r8:00000002 r7:60000113 r6:e04d9d8c r5:8441d400 r4:8441d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8441d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8441d400 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba2b8c r4:84ba2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ba2b8c r4:84bb5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8441d400 r8:84bb5bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bb5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb5b80 r8:8027ed34 r7:e0641e60 r6:84bb5c00 r5:8441d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b68dc0 INFO: task kworker/0:148:3822 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/0:149:3823 blocked for more than 453 seconds. r5:8441e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfa3f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:3824 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0669d84 r8:00000002 r7:60000113 r6:e0669d8c r5:8441ec00 r4:8441ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8441ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ff80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8441ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0445000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r4:00000000 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:3825 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e066dd84 r8:00000002 r7:60000113 r6:e066dd8c r5:8441a400 r4:8441a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8441a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e066de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8441a400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 dd60: 800f0013 ffffffff r4:00000000 r5:84b96f8c r4:84b96c00 r4:00000001 r4:84bbf300 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85004f8c r4:84bcad80 r4:00000001 r4:84b4b3c0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbf300 task:kworker/1:201 state:D stack:0 pid:3829 tgid:3829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0675d84 r8:00000002 r7:60000013 r6:e0675d8c r5:850b0c00 r4:850b0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850b0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0675e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500578c r4:85005400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500578c r4:84bcae00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b0c00 r8:84bcae2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bcae00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcae00 r8:8027ed34 r7:e05b9e60 r6:84b4d000 r5:850b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0675fb0 to 0xe0675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4b580 INFO: task kworker/1:201:3829 is blocked on a mutex likely owned by task kworker/0:132:3787. Exception stack(0xe05ddd20 to 0xe05ddd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 r4:84bbf300 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe47000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85005f8c r4:85005c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85005f8c r4:84bcae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b1800 r8:84bcaeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bcae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bcae80 r8:8027ed34 r7:e0675e60 r6:84b4d080 r5:850b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4b580 INFO: task kworker/1:202:3832 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: aa8c4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85005b8c r4:84bcaf00 Exception stack(0xe067dfb0 to 0xe067dff8) Workqueue: events bpf_prog_free_deferred r4:e05dddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:204:3837 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:204 state:D stack:0 pid:3837 tgid:3837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e068dd84 r8:00000002 r7:60000013 r6:e068dd8c r5:850b3000 r4:850b3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850b3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4b9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe63000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500638c r4:85006000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500638c r4:84bcaf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b3000 r8:84bcafac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bcaf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08 r9:83018205 r8:850b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r5:8500738c r4:85007000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500738c r4:84b56000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b5400 r8:84b5602c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b56000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56000 r8:8027ed34 r7:e068de60 r6:84b4d200 r5:850b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0691fb0 to 0xe0691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4ba00 INFO: task kworker/1:205:3838 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: aab1b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:206 state:D stack:0 pid:3839 tgid:3839 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:84b4ba00 r4:00000000 dd60: 800f0013 ffffffff r4:e05dddc0 r5:00001000 r4:e00d1000 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:3841 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:3841 tgid:3841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0659d84 r8:00000002 r7:60000113 r6:e0659d8c r5:84aed400 r4:84aed400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aed400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4bc80 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: ab3b4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4bdc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85006f8c r4:85006c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85006f8c r4:84b56200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aebc00 r8:84b5622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b56200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56200 r8:8027ed34 r7:e0691e60 r6:84b56280 r5:84aebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe069dfb0 to 0xe069dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4be00 INFO: task kworker/1:208:3844 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) r4:82ac21e4 r4:00000000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:209 state:D stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05ddd20 to 0xe05ddd68) r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 r4:84aeec00 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aeec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0021000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85007b8c r4:85007800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85007b8c r4:84b56400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aeec00 r8:84b5642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b56400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56400 r8:8027ed34 r7:e0681e60 r6:84b56480 r5:84aeec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0699fb0 to 0xe0699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e280 INFO: task kworker/1:210:3849 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ab899000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84ae9800 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e340 r7:ddde2d40 r6:83018200 r5:85007f8c r4:84b56500 Exception stack(0xe06a5fb0 to 0xe06a5ff8) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:3853 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:3853 tgid:3853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06a9d84 r8:00000002 r7:60000113 r6:e06a9d8c r5:84aeb000 r4:84aeb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aeb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aeb000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e009b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450778c r4:84507400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8450778c r4:84b56600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aeb000 r8:84b5662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b56600 Exception stack(0xe06a9fb0 to 0xe06a9ff8) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b56700 r8:8027ed34 r7:e06a9e60 r6:84b56780 r5:84aee000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 dd60: 800f0013 ffffffff r4:e05dddc0 r4:00000000 r5:00001000 r4:e00d1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:e06b1d84 r8:00000002 r7:60000113 r6:e06b1d8c r5:85028000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5e640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85028000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500838c r4:85008000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500838c r4:84b56800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85028000 r8:84b5682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b56800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56800 r8:8027ed34 r7:e06ade60 r6:84b56880 r5:85028000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b1fb0 to 0xe06b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5e600 INFO: task kworker/1:214:3857 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ac0aa000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:3858 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:3858 tgid:3858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06b5d84 r8:00000002 r7:60000013 r6:e06b5d8c r5:85028c00 r4:85028c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85028c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b5e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b56900 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05ddd20 to 0xe05ddd68) r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:3860 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:3860 tgid:3860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06bdd84 r8:00000002 r7:60000113 r6:e06bdd8c r5:85029800 r4:85029800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85029800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd4900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85029800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ba3f8c r4:84ba3c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84ba3f8c r4:84b4d300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85029800 r8:84b4d32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b4d300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b4d300 r8:8027ed34 r7:e066de60 r6:84b56a00 r5:85029800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06bdfb0 to 0xe06bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5fec0 INFO: task kworker/0:152:3860 is blocked on a mutex likely owned by task kworker/0:132:3787. r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:216 state:D stack:0 pid:3862 tgid:3862 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ea00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8502a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0453000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85008b8c r4:85008800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85008b8c r4:84b56a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502a400 r8:84b56aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b56a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56a80 r8:8027ed34 r7:e06b5e60 r6:84b56b00 r5:8502a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5eb40 INFO: task kworker/1:216:3862 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ac651000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bbf300 INFO: task kworker/1:217:3864 blocked for more than 453 seconds. r4:8502b000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c1e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0489000 r7:ddde2d40 r6:83018200 r5:8500938c r4:84b56b80 r4:00000001 Exception stack(0xe06c1fb0 to 0xe06c1ff8) r4:84b5eac0 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r4:00000000 r5:00001000 r4:e00d1000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:3866 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06c5d84 r8:00000002 r7:60000013 r6:e06c5d8c r5:8502bc00 r4:8502bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b5ee80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8502bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04af000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500978c r4:85009400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500978c r4:84b56c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502bc00 r8:84b56cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b56c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56c80 r8:8027ed34 r7:e06c1e60 r6:84b56d00 r5:8502bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c5fb0 to 0xe06c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b5ec40 INFO: task kworker/1:218:3866 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ad084000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:00001000 r4:e00d1000 r5:84b96f8c r4:84b96c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05ddfb0 to 0xe05ddff8) r4:84bbf300 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8502c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85009b8c r4:84b56e00 r10:61c88647 r9:8502c800 r8:84b56e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b56e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56e00 r8:8027ed34 r7:e06c5e60 r6:84b56e80 r5:8502c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbe000 INFO: task kworker/1:219:3868 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ad2ef000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:3870 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:3870 tgid:3870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06cdd84 r8:00000002 r7:60000113 r6:e06cdd8c r5:8502d400 r4:8502d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbe1c0 r9:83018205 r8:8502d400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85009f8c r4:85009c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85009f8c r4:84b56d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502d400 r8:84b56dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b56d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56d80 r8:8027ed34 r7:e06c9e60 r6:84b56f00 r5:8502d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbe300 INFO: task kworker/1:220:3870 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ad77a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b56f80 r8:8027ed34 r7:e06cde60 r6:84bc2000 r5:8502e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:82ac21e4 r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:222 state:D stack:0 pid:3874 tgid:3874 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bc2080 r8:8027ed34 r7:e06d1e60 r6:84bc2100 r5:8502ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbe640 INFO: task kworker/1:222:3874 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: adabb000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:3876 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:3876 tgid:3876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06d9d84 r8:00000002 r7:60000113 r6:e06d9d8c r5:85030000 r4:85030000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85030000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbe500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85030000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ed000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500a78c r4:8500a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500a78c r4:84bc2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85030000 r8:84bc21ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2180 r8:8027ed34 r7:e06d1e60 r6:84bc2200 r5:85030000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbe440 INFO: task kworker/1:223:3876 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05ddfb0 to 0xe05ddff8) r4:84bbf300 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06e1d84 r8:00000002 r7:60000113 r6:e06e1d8c r5:85030c00 r4:85030c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85030c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbe7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85030c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0501000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500ab8c r4:8500a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500ab8c r4:84bc2280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85030c00 r8:84bc22ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2280 r8:8027ed34 r7:e06d1e60 r6:84bc2300 r5:85030c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbe440 INFO: task kworker/1:224:3877 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ae023000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:3881 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:225 state:D stack:0 pid:3881 tgid:3881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06ddd84 r8:00000002 r7:60000113 r6:e06ddd8c r5:85031800 r4:85031800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85031800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbe8c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85031800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0527000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500af8c r4:8500ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500af8c r4:84bc2380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85031800 r8:84bc23ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2380 r8:8027ed34 r7:e06d1e60 r6:84bc2400 r5:85031800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbe9c0 INFO: task kworker/1:225:3881 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ae023000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:226:3882 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:226 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06e5d84 r8:00000002 r7:60000113 r6:e06e5d8c r5:85032400 r4:85032400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85032400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbeac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85032400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0545000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500b78c r4:8500b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500b78c r4:84bc2480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85032400 r8:84bc24ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2480 r8:8027ed34 r7:e06d1e60 r6:84bc2500 r5:85032400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbe9c0 INFO: task kworker/1:226:3882 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ae59f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:227 state:D stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbed80 r5:8500bb8c r4:8500b800 r4:84bc2580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:3886 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:3886 tgid:3886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06f1d84 r8:00000002 r7:60000113 r6:e06f1d8c r5:85033c00 r4:85033c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85033c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85033c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85014b8c r4:85014800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85014b8c r4:84bc2680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85033c00 r8:84bc26ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2680 r8:8027ed34 r7:e06ede60 r6:84bc2700 r5:85033c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbefc0 INFO: task kworker/1:228:3886 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ae796000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:229:3889 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:229 state:D stack:0 pid:3889 tgid:3889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:85034800 r4:85034800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85034800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbee80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85034800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df83d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500bf8c r4:8500bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500bf8c r4:84bc2780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85034800 r8:84bc27ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2780 r8:8027ed34 r7:e06f1e60 r6:84bc2800 r5:85034800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0651fb0 to 0xe0651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: ae9ca000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:230 state:D stack:0 pid:3890 tgid:3890 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84763640 r7:ddde2d40 r6:83018200 r5:8501438c r4:84bc2880 Exception stack(0xe06f9fb0 to 0xe06f9ff8) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:3891 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0701d84 r8:00000002 r7:60000013 r6:e0701d8c r5:85036000 r4:85036000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85036000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0701e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85036000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb97000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501478c r4:85014400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501478c r4:84bc2980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85036000 r8:84bc29ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2980 r8:8027ed34 r7:e06f1e60 r6:84bc2a00 r5:85036000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0701fb0 to 0xe0701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847639c0 INFO: task kworker/1:231:3891 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: aedc5000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:232:3895 blocked for more than 454 seconds. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06fde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85036c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd2b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501538c r4:85015000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501538c r4:84bc2a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85036c00 r8:84bc2aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2a80 r8:8027ed34 r7:e06f1e60 r6:84bc2b00 r5:85036c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06fdfb0 to 0xe06fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be10c0 INFO: task kworker/1:232:3895 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: af222000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:233:3896 blocked for more than 454 seconds. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bc2b80 r8:8027ed34 r7:e06fde60 r6:84bc2c00 r5:85038000 r4:84be1380 Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:85039800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85039800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0709e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc41c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85039800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85016b8c r4:85016800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85016b8c r4:84bc2c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85039800 r8:84bc2cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2c80 r8:8027ed34 r7:e06fde60 r6:84bc2d00 r5:85039800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0709fb0 to 0xe0709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be1440 INFO: task kworker/1:234:3898 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: af6ce000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:235 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bc2e00 r8:8027ed34 r7:e0709e60 r6:84bc2e80 r5:8503a400 r4:84be1780 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:236:3901 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:236 state:D stack:0 pid:3901 tgid:3901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e070dd84 r8:00000002 r7:60000113 r6:e070dd8c r5:85038c00 r4:85038c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85038c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be16c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85038c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85015b8c r4:85015800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85015b8c r4:84bc2d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85038c00 r8:84bc2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bc2d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bc2d80 r8:8027ed34 r7:e0709e60 r6:84bc2f00 r5:85038c00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 task:kworker/1:237 state:D stack:0 pid:3903 tgid:3903 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:85015f8c r4:85015c00 r10:61c88647 r9:8503b000 r8:84bc2fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:3906 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:3906 tgid:3906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e072dd84 r8:00000002 r7:60000113 r6:e072dd8c r5:8503c800 r4:8503c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e072de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8503c800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff65000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501638c r4:85016000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501638c r4:85025080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503c800 r8:850250ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025080 r8:8027ed34 r7:e0709e60 r6:85025100 r5:8503c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe072dfb0 to 0xe072dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:239 state:D stack:0 pid:3908 tgid:3908 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:dff9f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b0354000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8503e000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501c38c r4:8501c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501c38c r4:85025280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503e000 r8:850252ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025280 r8:8027ed34 r7:e0709e60 r6:85025300 r5:8503e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0735fb0 to 0xe0735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc4100 INFO: task kworker/1:240:3911 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd60: 800f0013 ffffffff r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85025380 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r5:00001000 r4:e00d1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501738c r4:85017000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501738c r4:85025400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b6c00 r8:8502542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025400 r8:8027ed34 r7:e0735e60 r6:84b4d400 r5:850b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc4380 INFO: task kworker/1:242:3914 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b0939000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85025480 r8:8027ed34 r7:e0735e60 r6:84b4d480 r5:850b6000 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b0f5b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 Exception stack(0xe05ddfb0 to 0xe05ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84910000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84910000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0549000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85017b8c r4:85017800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85017b8c r4:85025500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84910000 r8:8502552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025500 r8:8027ed34 r7:e0735e60 r6:84b4d500 r5:84910000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0745fb0 to 0xe0745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc46c0 INFO: task kworker/1:244:3919 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b0f5b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84910c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85017f8c r4:85017c00 r4:85025580 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: b142e000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:246 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84911800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4d00 r5:8501cb8c r4:8501c800 r4:85025600 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:3925 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:84912400 r4:84912400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84912400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84912400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0757000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841da78c r4:841da400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84912400 r8:84b4d6ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:247:3926 blocked for more than 454 seconds. r4:84913000 r5:84913000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4c80 r5:8501c78c r4:8501c400 r10:61c88647 r9:84913000 r8:850256ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84913c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84913c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be1c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84913c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d38c r4:8501d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501d38c r4:85025700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84913c00 r8:8502572c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025700 r8:8027ed34 r7:e074de60 r6:84b4d800 r5:84913c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0761fb0 to 0xe0761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc4dc0 INFO: task kworker/1:248:3929 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b17eb000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:249 state:D stack:0 pid:3930 tgid:3930 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84914800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8501cf8c r4:85025780 r4:85025780 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:249:3930 is blocked on a mutex likely owned by task kworker/0:132:3787. dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:3933 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:3933 tgid:3933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0771d84 r8:00000002 r7:60000113 r6:e0771d8c r5:84915400 r4:84915400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84915400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0771e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84915400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0647000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501d78c r4:8501d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501d78c r4:85025800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84915400 r8:8502582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025800 r8:8027ed34 r7:e0761e60 r6:84b4d900 r5:84915400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bc4f80 INFO: task kworker/1:250:3933 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b1f83000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84916000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0775e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8501df8c r4:85025880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:e00d1000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:3936 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:3936 tgid:3936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0779d84 r8:00000002 r7:60000113 r6:e0779d8c r5:8503ec00 r4:8503ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8503ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be24c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8503ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0787000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501db8c r4:8501d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501db8c r4:85025900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503ec00 r8:8502592c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025900 r8:8027ed34 r7:e0775e60 r6:85025980 r5:8503ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0779fb0 to 0xe0779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2000 INFO: task kworker/1:252:3936 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85041800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b4da00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:3942 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0791d84 r8:00000002 r7:60000113 r6:e0791d8c r5:85040000 r4:85040000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85040000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0791e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85040000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501e38c r4:8501e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501e38c r4:85025a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85040000 r8:85025aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025a80 r8:8027ed34 r7:e0775e60 r6:85025b00 r5:85040000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0791fb0 to 0xe0791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: b27b0000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05ddfb0 to 0xe05ddff8) Not tainted 6.15.0-syzkaller #0 r5:85042400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8501e78c r4:85025b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85042400 r8:85025bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025b80 r8:8027ed34 r7:e0791e60 r6:85025c00 r5:85042400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0781fb0 to 0xe0781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be26c0 INFO: task kworker/1:254:3944 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b2bd3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85043000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ed40 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:e05dddc0 r5:00001000 r4:e00d1000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:e073dd84 r8:00000002 r7:60000013 r6:e073dd8c r5:85043c00 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2a80 r5:8501eb8c r4:8501e800 r4:85025d00 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:3949 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:3949 tgid:3949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07b9d84 r8:00000002 r7:60000113 r6:e07b9d8c r5:85044800 r4:85044800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85044800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85044800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07cd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501ef8c r4:8501ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501ef8c r4:85025e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85044800 r8:85025e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85025e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85025e00 r8:8027ed34 r7:e073de60 r6:85025e80 r5:85044800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b9fb0 to 0xe07b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2a40 INFO: task kworker/1:256:3949 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b3087000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85045400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85045400 r8:85025f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85046000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d9e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501f78c r4:8501f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501f78c r4:8506a000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85046000 r8:8506a02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506a000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a000 r8:8027ed34 r7:e07d1e60 r6:8506a080 r5:85046000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d9fb0 to 0xe07d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84be2b80 INFO: task kworker/1:258:3953 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b3793000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:3956 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:3956 tgid:3956 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85046c00 r5:85046c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8506a100 r8:8027ed34 r7:e07d9e60 r6:8506a180 r5:85046c00 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84950000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84950000 r8:8506a22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:3959 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:3959 tgid:3959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07f1d84 r8:00000002 r7:60000113 r6:e07f1d8c r5:84950c00 r4:84950c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84950c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506e240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84950c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501ff8c r4:8501fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501ff8c r4:8506a280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84950c00 r8:8506a2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84953000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506e880 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84953c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4805e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506e500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84953c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcfb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511478c r4:85114400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511478c r4:8506a380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84953c00 r8:8506a3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506a380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a380 r8:8027ed34 r7:e07f9e60 r6:84b4dc80 r5:84953c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4805fb0 to 0xe4805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506e2c0 INFO: task kworker/1:263:3962 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b3ef4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:3964 blocked for more than 454 seconds. task:kworker/1:264 state:D stack:0 pid:3964 tgid:3964 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84954800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:265:3966 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:265 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0685d84 r8:00000002 r7:60000113 r6:e0685d8c r5:84952400 r4:84952400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84952400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506e800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84952400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85114f8c r4:85114c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85114f8c r4:8506a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84952400 r8:8506a4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a480 r8:8027ed34 r7:e07f9e60 r6:84b4dd80 r5:84952400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0685fb0 to 0xe0685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506e580 INFO: task kworker/1:265:3966 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84956c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4819e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506eb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84956c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0017000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85115b8c r4:85115800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85115b8c r4:8506a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84956c00 r8:8506a52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a500 r8:8027ed34 r7:e07f9e60 r6:84b4de00 r5:84956c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4819fb0 to 0xe4819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: b467a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r4:e05dddc0 r5:00001000 r4:e00d1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8503d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511578c r4:85115400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511578c r4:8506a580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503d400 r8:8506a5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506a580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a580 r8:8027ed34 r7:e4819e60 r6:8506a600 r5:8503d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4809fb0 to 0xe4809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506eb80 INFO: task kworker/1:267:3971 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b49b9000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85040c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8511678c r4:85116400 r4:8506a680 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:3975 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:3975 tgid:3975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0655d84 r8:00000002 r7:60000013 r6:e0655d8c r5:85048000 r4:85048000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85048000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ed80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85048000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85115f8c r4:85115c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85115f8c r4:8506a780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85048000 r8:8506a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506a780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506a780 r8:8027ed34 r7:e4815e60 r6:8506a800 r5:85048000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85048c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4821e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85049800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4849e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85116b8c r4:8506a980 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506ef40 INFO: task kworker/1:271:3980 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b50c9000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:272:3982 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:272 state:D stack:0 pid:3982 tgid:3982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e484dd84 r8:00000002 r7:60000013 r6:e484dd8c r5:8504a400 r4:8504a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8504a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8506aa80 r8:8027ed34 r7:e4849e60 r6:8506ab00 r5:8504a400 r4:85081280 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r5:00001000 r4:e00d1000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:e4851d84 r8:00000002 r7:60000113 r6:e4851d8c r5:8504b000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85081100 INFO: task kworker/1:273:3984 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b5394000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:3986 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:274 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e4855d84 r8:00000002 r7:60000013 r6:e4855d8c r5:8504bc00 r4:8504bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8504bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4855e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8504bc00 r8:8506acac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:275:3989 blocked for more than 454 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e485dd84 r8:00000002 r7:60000113 r6:e485dd8c r5:8504c800 r4:8504c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8504c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e485de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8504c800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04d3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85117b8c r4:85117800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85117b8c r4:8506ad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8504c800 r8:8506adac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8506ad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506ad80 r8:8027ed34 r7:e4851e60 r6:8506ae00 r5:8504c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe485dfb0 to 0xe485dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85081740 INFO: task kworker/1:275:3989 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b5cd3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8504d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85117f8c r4:85117c00 r10:61c88647 r9:8504d400 r8:8506aeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 Workqueue: events bpf_prog_free_deferred r5:8504e000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081900 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b5cd3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:3994 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:3994 tgid:3994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e4871d84 r8:00000002 r7:60000013 r6:e4871d8c r5:8504ec00 r4:8504ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8504ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4871e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8504ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511c78c r4:8511c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511c78c r4:85089080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8504ec00 r8:850890ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089080 r8:8027ed34 r7:e4861e60 r6:85089100 r5:8504ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4871fb0 to 0xe4871ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85050c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85089180 r8:8027ed34 r7:e4871e60 r6:85089200 r5:85050c00 r4:85081ac0 Call trace: dd20: b6147000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:3999 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:3999 tgid:3999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e4875d84 r8:00000002 r7:60000113 r6:e4875d8c r5:85051800 r4:85051800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85051800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4875e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85051800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0689000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511cf8c r4:8511cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511cf8c r4:85089280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85051800 r8:850892ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089280 r8:8027ed34 r7:e4879e60 r6:85089300 r5:85051800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4875fb0 to 0xe4875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85081d00 INFO: task kworker/1:280:3999 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:00001000 r4:e00d1000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:281:4000 blocked for more than 455 seconds. r4:85052400 r5:85052400 r4:829187f0 r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85089380 r8:8027ed34 r7:e4875e60 r6:85089400 r5:85052400 r4:85081d00 Call trace: dd20: b6502000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:282:4003 blocked for more than 455 seconds. r5:85053c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8889e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bc4f80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85053c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511d78c r4:8511d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511d78c r4:85089480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85053c00 r8:850894ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089480 r8:8027ed34 r7:e487de60 r6:85089500 r5:85053c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8889fb0 to 0xe8889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85081fc0 INFO: task kworker/1:282:4003 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b6a6a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:283:4004 blocked for more than 455 seconds. r5:84955400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e888de08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84955400 r8:850895ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:284 state:D stack:0 pid:4005 tgid:4005 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85089600 r8:8027ed34 r7:e888de60 r6:84b4df00 r5:84951800 r4:84be1c80 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:4008 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:4008 tgid:4008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e88a5d84 r8:00000002 r7:60000113 r6:e88a5d8c r5:848c0000 r4:848c0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85098180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8897000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511df8c r4:8511dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511df8c r4:85089680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c0000 r8:850896ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089680 r8:8027ed34 r7:e888de60 r6:84b4df80 r5:848c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a5fb0 to 0xe88a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85098100 INFO: task kworker/1:285:4008 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b6e0a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 Workqueue: events bpf_prog_free_deferred r5:848c1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85098240 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848c2400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b5e08 r9:83018205 r8:848c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:848c2400 r8:850897ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:4012 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e88c5d84 r8:00000002 r7:60000113 r6:e88c5d8c r5:848c3c00 r4:848c3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85098700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df983000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511ef8c r4:8511ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511ef8c r4:85089800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c3c00 r8:8508982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089800 r8:8027ed34 r7:e88b5e60 r6:85151100 r5:848c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88c5fb0 to 0xe88c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85098380 INFO: task kworker/1:288:4012 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b7878000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r4:82ac21e4 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:156 state:D stack:0 pid:4015 tgid:4015 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848c3000 r4:829187f0 r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8508eb40 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:4017 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:4017 tgid:4017 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e88ddd84 r8:00000002 r7:60000013 r6:e88ddd8c r5:848c4800 r4:848c4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88dde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85098b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd67000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511ff8c r4:8511fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848c4800 r8:850898ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c0c00 r5:848c0c00 r4:829187f0 r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:291 state:D stack:0 pid:4021 tgid:4021 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:85054800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r10:61c88647 r9:85054800 r8:850899ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85098780 INFO: task kworker/1:291:4021 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b82a0000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:4024 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:4024 tgid:4024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e88edd84 r8:00000002 r7:60000113 r6:e88edd8c r5:85055400 r4:85055400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85055400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88ede08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85098ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85055400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc79000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511fb8c r4:8511f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511fb8c r4:85089a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85055400 r8:85089aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089a80 r8:8027ed34 r7:e88dde60 r6:85089b00 r5:85055400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88edfb0 to 0xe88edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85098a00 INFO: task kworker/1:292:4024 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85056c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8895e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85098e00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85056c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512838c r4:85128000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512838c r4:85089b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85056c00 r8:85089bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089b80 r8:8027ed34 r7:e88dde60 r6:85089c00 r5:85056c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8895fb0 to 0xe8895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85098bc0 INFO: task kworker/1:293:4026 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b860b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85050000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515d100 r5:00001000 r4:dff7f000 r5:85128b8c r4:85128800 r7:ddde2d40 r6:83018200 r5:85128b8c r4:85089c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:4030 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:4030 tgid:4030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea905d84 r8:00000002 r7:60000013 r6:ea905d8c r5:85058000 r4:85058000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85058000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea905e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847638c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff03000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512878c r4:85128400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512878c r4:85089d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:85089dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089d80 r8:8027ed34 r7:e88f5e60 r6:85089e00 r5:85058000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea905fb0 to 0xea905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763a80 INFO: task kworker/1:295:4030 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b8b83000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b96f8c r4:84b96c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848c6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85089e80 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:4034 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea915d84 r8:00000002 r7:60000013 r6:ea915d8c r5:84916c00 r4:84916c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84916c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515d3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84916c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512938c r4:85129000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512938c r4:85089f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84916c00 r8:85089f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089f00 r8:8027ed34 r7:ea90de60 r6:85151400 r5:84916c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea915fb0 to 0xea915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515d200 INFO: task kworker/1:297:4034 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b90a0000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:4036 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:4036 tgid:4036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:848c6c00 r5:848c6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea91de08 r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0587000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85129f8c r4:85129c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85129f8c r4:85089f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c6c00 r8:85089fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85089f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85089f80 r8:8027ed34 r7:ea915e60 r6:85151480 r5:848c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea91dfb0 to 0xea91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515d300 INFO: task kworker/1:298:4036 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b90a0000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:299:4038 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:299 state:D stack:0 pid:4038 tgid:4038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:850c8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8512978c r4:85165000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c8000 r8:8516502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165000 r8:8027ed34 r7:ea91de60 r6:85151500 r5:850c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea925fb0 to 0xea925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515d300 INFO: task kworker/1:299:4038 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b90a0000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:300:4039 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea929d84 r8:00000002 r7:60000113 r6:ea929d8c r5:850c8c00 r4:850c8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850c8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea929e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515d580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85129b8c r4:85129800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85129b8c r4:85165080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85165080 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:300:4039 is blocked on a mutex likely owned by task kworker/0:132:3787. r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:00001000 r4:e00d1000 r5:84b96f8c r4:84b96c00 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4042 tgid:4042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea935d84 r8:00000002 r7:60000013 r6:ea935d8c r5:850cb000 r4:850cb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850cb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea935e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515db80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0631000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512ab8c r4:8512a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512ab8c r4:85165100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cb000 r8:8516512c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165100 r8:8027ed34 r7:ea91de60 r6:85151600 r5:850cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea935fb0 to 0xea935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515d440 INFO: task kworker/1:301:4042 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b9a4f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:850c9800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea941e08 r9:83018205 r8:850c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 r7:ddde2d40 r6:83018200 r5:8512a38c r4:85165180 Exception stack(0xea941fb0 to 0xea941ff8) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:4045 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:4045 tgid:4045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea949d84 r8:00000002 r7:60000113 r6:ea949d8c r5:850ca400 r4:850ca400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ca400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea949e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515d9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0615000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512a78c r4:8512a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512a78c r4:85165200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ca400 r8:8516522c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165200 r8:8027ed34 r7:ea935e60 r6:85151700 r5:850ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea949fb0 to 0xea949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515db00 INFO: task kworker/1:303:4045 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:4048 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea951d84 r8:00000002 r7:60000013 r6:ea951d8c r5:850cd400 r4:850cd400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850cd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515de00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0759000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512b38c r4:8512b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512b38c r4:85165280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cd400 r8:851652ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165280 r8:8027ed34 r7:ea935e60 r6:85151780 r5:850cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea951fb0 to 0xea951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515db40 INFO: task kworker/1:304:4048 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: b9d1e000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:84b96f8c r4:84b96c00 r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85059800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea945e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515dc80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85059800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0645000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512af8c r4:8512ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512af8c r4:85165300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85059800 r8:8516532c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165300 r8:8027ed34 r7:ea951e60 r6:85165380 r5:85059800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea945fb0 to 0xea945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515db40 INFO: task kworker/1:305:4049 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ba649000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:4052 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:4052 tgid:4052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea94dd84 r8:00000002 r7:60000113 r6:ea94dd8c r5:8505a400 r4:8505a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8505a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea94de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515df00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8505a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e079f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512bb8c r4:8512b800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512bb8c r4:85165400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505a400 r8:8516542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165400 r8:8027ed34 r7:ea951e60 r6:85165480 r5:8505a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea94dfb0 to 0xea94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508e3c0 INFO: task kworker/1:306:4052 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ba649000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:307:4053 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:307 state:D stack:0 pid:4053 tgid:4053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea909d84 r8:00000002 r7:60000013 r6:ea909d8c r5:8505b000 r4:8505b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8505b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508e2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85165500 Exception stack(0xea909fb0 to 0xea909ff8) r4:8508e3c0 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:00000000 r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8505bc00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515db00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8505bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512bf8c r4:8512bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512bf8c r4:85165680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505bc00 r8:851656ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165680 r8:8027ed34 r7:ea94de60 r6:85165700 r5:8505bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea959fb0 to 0xea959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763a80 INFO: task kworker/1:308:4056 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: baa6c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf300 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8505c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:8505c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 r7:ddde2d40 r6:83018200 r5:8512c38c r4:85165600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505c800 r8:8516562c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165600 r8:8027ed34 r7:ea959e60 r6:85165780 r5:8505c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea961fb0 to 0xea961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85176100 INFO: task kworker/1:309:4058 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bb00b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 INFO: task kworker/1:310:4060 blocked for more than 455 seconds. r5:8505d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05ddd20 to 0xe05ddd68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:4062 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:4062 tgid:4062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea969d84 r8:00000002 r7:60000113 r6:ea969d8c r5:8505e000 r4:8505e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8505e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176100 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8505e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88d5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512cb8c r4:8512c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512cb8c r4:85165980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505e000 r8:851659ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165980 r8:8027ed34 r7:ea965e60 r6:85165a00 r5:8505e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85176440 INFO: task kworker/1:311:4062 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd60: 800f0013 ffffffff r4:e05dddc0 r5:00001000 r4:e00d1000 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 Not tainted 6.15.0-syzkaller #0 r4:8505ec00 r5:8505ec00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:85176300 INFO: task kworker/1:312:4064 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bb357000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 INFO: task kworker/1:313:4066 blocked for more than 455 seconds. r5:85058c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea971e08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:313:4066 is blocked on a mutex likely owned by task kworker/0:132:3787. r5:800f0013 r4:80239bd0 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:314:4067 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:314 state:D stack:0 pid:4067 tgid:4067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea95dd84 r8:00000002 r7:60000013 r6:ea95dd8c r5:85056000 r4:85056000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85056000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea95de08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 dd60: 800f0013 ffffffff r4:00000000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:315 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85053000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85053000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea983000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512d78c r4:8512d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512d78c r4:85165d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85053000 r8:85165dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165d80 r8:8027ed34 r7:ea971e60 r6:85165e00 r5:85053000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea979fb0 to 0xea979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851767c0 INFO: task kworker/1:315:4070 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bbbbd000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:4072 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85190000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85165d00 r4:85176900 Exception stack(0xe05ddd20 to 0xe05ddd68) r4:00000000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:4074 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea981d84 r8:00000002 r7:60000013 r6:ea981d8c r5:85191800 r4:85191800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85191800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea981e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85180580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85191800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512fb8c r4:8512f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512fb8c r4:85165f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85191800 r8:85165f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85165f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85165f00 r8:8027ed34 r7:ea98de60 r6:85165f80 r5:85191800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea981fb0 to 0xea981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85176a00 INFO: task kworker/1:317:4074 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 800f0013 ffffffff r4:e05dddc0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:318:4076 blocked for more than 455 seconds. r5:850cc800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176f40 r4:00000001 r4:85176c00 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bc1f4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:4079 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9c1d84 r8:00000002 r7:60000013 r6:ea9c1d8c r5:850ce000 r4:850ce000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ce000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85180040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512eb8c r4:8512e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512eb8c r4:85186080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf300 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:850cbc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851801c0 r5:00001000 r4:ea9c3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512ef8c r4:8512ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512ef8c r4:85186100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cbc00 r8:8518612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85186100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186100 r8:8027ed34 r7:ea981e60 r6:85151900 r5:850cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9cdfb0 to 0xea9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85180000 INFO: task kworker/1:320:4080 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bc7c8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:4082 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9e5d84 r8:00000002 r7:60000113 r6:ea9e5d8c r5:850cec00 r4:850cec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850cec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85180280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512f38c r4:8512f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512f38c r4:85186180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cec00 r8:851861ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85186180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186180 r8:8027ed34 r7:ea981e60 r6:85151980 r5:850cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e5fb0 to 0xea9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85180180 INFO: task kworker/1:321:4082 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bc7c8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:84bdfb80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:322 state:D stack:0 pid:4086 tgid:4086 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a38c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9fde08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85180480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a38c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512f78c r4:8512f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8512f78c r4:85186200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38c00 r8:8518622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85186200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186200 r8:8027ed34 r7:ea981e60 r6:85151a00 r5:84a38c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9fdfb0 to 0xea9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851803c0 INFO: task kworker/1:322:4086 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bcce4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a39800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:8513438c r4:85134000 r4:00000001 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:324:4088 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:4088 tgid:4088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85193000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 INFO: task kworker/1:324:4088 is blocked on a mutex likely owned by task kworker/0:132:3787. r4:e05dddc0 r5:84b96f8c r4:84b96c00 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:4091 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:325 state:D stack:0 pid:4091 tgid:4091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa09d84 r8:00000002 r7:60000013 r6:eaa09d8c r5:85193c00 r4:85193c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85193c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85180940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85193c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa11000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:85180840 r4:00000000 r4:e05dddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84bbf300 Workqueue: events bpf_prog_free_deferred r5:85194800 r4:829187f0 r4:00000000 r5:00001000 r4:dfa65000 r7:ddde2d40 r6:83018200 r5:8513578c r4:85186500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85194800 r8:8518652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85186500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186500 r8:8027ed34 r7:eaa09e60 r6:85186580 r5:85194800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa15fb0 to 0xeaa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85180ac0 INFO: task kworker/1:326:4094 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bdbda000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 task:kworker/1:327 state:D stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:85195400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85180ac0 INFO: task kworker/1:327:4095 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bdbda000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85196000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r4:00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:329:4099 blocked for more than 455 seconds. r5:85190c00 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:85186800 r4:85176e40 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:330:4101 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:330 state:D stack:0 pid:4101 tgid:4101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e88a9d84 r8:00000002 r7:60000113 r6:e88a9d8c r5:85192400 r4:85192400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85192400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d5140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85192400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd3f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85135f8c r4:85135c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85135f8c r4:85186900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85192400 r8:8518692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85186900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186900 r8:8027ed34 r7:eaa15e60 r6:85151b00 r5:85192400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a9fb0 to 0xe88a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 Workqueue: events bpf_prog_free_deferred r5:848c5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d5040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb19000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85135b8c r4:85135800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85135b8c r4:85186980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c5400 r8:851869ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85186980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186980 r8:8027ed34 r7:e88a9e60 r6:85186a00 r5:848c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa29fb0 to 0xeaa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d5280 INFO: task kworker/1:331:4103 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: be232000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfb80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 800f0013 ffffffff [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) Exception stack(0xe05ddfb0 to 0xe05ddff8) Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85198c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r5:8513638c r4:85136000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513638c r4:85186b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85198c00 r8:85186bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85186b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186b80 r8:8027ed34 r7:eaa3de60 r6:85186c00 r5:85198c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa39fb0 to 0xeaa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d52c0 INFO: task kworker/1:333:4107 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: be4f3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05ddfb0 to 0xe05ddff8) Not tainted 6.15.0-syzkaller #0 r5:84a3bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d54c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeaa49fb0 to 0xeaa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d5600 INFO: task kworker/1:334:4109 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r4:e05dddc0 r4:00000000 r5:84b96f8c r4:84b96c00 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 task:kworker/1:335 state:D stack:0 pid:4112 tgid:4112 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85186d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186d00 r8:8027ed34 r7:eaa3de60 r6:85151c00 r5:84a3d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa55fb0 to 0xeaa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d5880 INFO: task kworker/1:335:4112 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: beae2000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:4113 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:84a3c800 r4:84a3c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e0455000 r10:61c88647 r9:84a3c800 r8:85186dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:4114 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:4114 tgid:4114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa5dd84 r8:00000002 r7:60000113 r6:eaa5dd8c r5:84a3a400 r4:84a3a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d58c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a3a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e008f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513738c r4:85137000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8513738c r4:85186e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3a400 r8:85186e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85186e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186e00 r8:8027ed34 r7:eaa59e60 r6:85151d00 r5:84a3a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa5dfb0 to 0xeaa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d56c0 INFO: task kworker/1:337:4114 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bf32a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d59c0 r5:8513778c r4:85137400 r4:85186e80 Exception stack(0xeaa65fb0 to 0xeaa65ff8) r4:851d5b00 Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:339:4119 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:339 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa69d84 r8:00000002 r7:60000113 r6:eaa69d8c r5:84a3ec00 r4:84a3ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d5c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85137f8c r4:85137c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85137f8c r4:85186f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:85186f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85186f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85186f00 r8:8027ed34 r7:eaa59e60 r6:85151e00 r5:84a3ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa69fb0 to 0xeaa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d5b40 INFO: task kworker/1:339:4119 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84a3e000 r8:85186fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:341 state:D stack:0 pid:4123 tgid:4123 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eaa71d84 r8:00000002 r7:60000113 r6:eaa71d8c r5:84a38000 r4:84a38000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a38000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a38000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85140b8c r4:85140800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85140b8c r4:851e2000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a38000 r8:851e202c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2000 r8:8027ed34 r7:eaa6de60 r6:85151f00 r5:84a38000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa71fb0 to 0xeaa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d5cc0 INFO: task kworker/1:341:4123 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:84b96f8c r4:84b96c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eaa61d84 r8:00000002 r7:60000013 r6:eaa61d8c r5:85196c00 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85196c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0529000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514078c r4:85140400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514078c r4:851e2080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85196c00 r8:851e20ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2080 r8:8027ed34 r7:eaa71e60 r6:85151f80 r5:85196c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa61fb0 to 0xeaa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d5ec0 INFO: task kworker/1:342:4126 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: bfb12000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e00d1000 r4:00000001 INFO: task kworker/1:343:4127 blocked for more than 456 seconds. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8514178c r4:85141400 r4:00000001 r4:851d5cc0 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:4129 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:4129 tgid:4129 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e06e9000 r7:ddde2d40 r6:83018200 r5:85140f8c r4:851e2180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:4134 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:4134 tgid:4134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa81d84 r8:00000002 r7:60000113 r6:eaa81d8c r5:84a49800 r4:84a49800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a49800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:85141b8c r4:85141800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05ddd20 to 0xe05ddd68) r4:e05dddc0 r4:00000000 r5:84b96f8c r4:84b96c00 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:4136 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:4136 tgid:4136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa85d84 r8:00000002 r7:60000013 r6:eaa85d8c r5:84a4a400 r4:84a4a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e481d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85141f8c r4:85141c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85141f8c r4:851e2300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4a400 r8:851e232c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:84bdfb80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a4bc00 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e0680 INFO: task kworker/1:348:4138 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c0b42000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:4141 tgid:4141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaa1d84 r8:00000002 r7:60000113 r6:eaaa1d8c r5:84a4b000 r4:84a4b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0f80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa89000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514378c r4:85143400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514378c r4:851e2400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4b000 r8:851e242c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2400 r8:8027ed34 r7:eaa95e60 r6:851e7300 r5:84a4b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e0740 INFO: task kworker/1:349:4141 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c0f8e000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e889b000 r7:ddde2d40 r6:83018200 r5:8514278c r4:851e2480 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 800f0013 ffffffff r4:e05dddc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:4143 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e88ab000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:851e2500 r8:8027ed34 r7:eaaa1e60 r6:851e2580 r5:8519a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa41fb0 to 0xeaa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e08c0 INFO: task kworker/1:351:4143 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c1205000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 Exception stack(0xe05ddfb0 to 0xe05ddff8) r4:84bbf300 task:kworker/1:352 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519bc00 r8:851e262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2600 r8:8027ed34 r7:eaaa1e60 r6:851e2680 r5:8519bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa9dfb0 to 0xeaa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e0b40 INFO: task kworker/1:352:4146 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c1540000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 r5:84b96f8c r4:84b96c00 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0dc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:4150 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:4150 tgid:4150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:8519b000 r4:8519b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8519b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ec040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8519b000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85143b8c r4:85143800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85143b8c r4:851e2800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519b000 r8:851e282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2800 r8:8027ed34 r7:eaaa1e60 r6:851e2880 r5:8519b000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05ddfb0 to 0xe05ddff8) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eaab1d84 r8:00000002 r7:60000013 r6:eaab1d8c r5:8519e000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eaab9000 r7:ddde2d40 r6:83018200 r5:85143f8c r4:851e2900 Exception stack(0xeaab1fb0 to 0xeaab1ff8) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c1a1c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:4154 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaabdd84 r8:00000002 r7:60000113 r6:eaabdd8c r5:8519ec00 r4:8519ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8519ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ec340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8519ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514438c r4:85144000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514438c r4:851e2a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519ec00 r8:851e2a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2a00 r8:8027ed34 r7:eaab1e60 r6:851e2a80 r5:8519ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaabdfb0 to 0xeaabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:84b96f8c r4:84b96c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8519c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ec400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8519c800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514478c r4:85144400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514478c r4:851e2b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519c800 r8:851e2b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2b00 r8:8027ed34 r7:eaabde60 r6:851e2b80 r5:8519c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ec440 INFO: task kworker/1:357:4157 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c1e69000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851e2c00 r8:8027ed34 r7:eaac5e60 r6:851e2c80 r5:85199800 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ec6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a4ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85144b8c r4:85144800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85144b8c r4:851e2d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4ec00 r8:851e2d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2d00 r8:8027ed34 r7:eaad1e60 r6:851e7400 r5:84a4ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaddfb0 to 0xeaaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ec440 INFO: task kworker/1:359:4159 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c25fb000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) r4:84bbf300 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:851e2d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:e00d1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:4164 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:4164 tgid:4164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:84a4c800 r4:84a4c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a4c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e54c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a4c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc35000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ddb8c r4:850dd800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850ddb8c r4:851e7500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4c800 r8:851e752c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e7500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e7500 r8:8027ed34 r7:e0799e60 r6:851e7580 r5:84a4c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad9fb0 to 0xeaad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e5b00 INFO: task kworker/0:157:4164 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c2816000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:4166 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:4166 tgid:4166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab01d84 r8:00000002 r7:60000013 r6:eab01d8c r5:85210000 r4:85210000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85210000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ecac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85210000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab03000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514578c r4:85145400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514578c r4:851e2e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85210000 r8:851e2e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2e00 r8:8027ed34 r7:eaad1e60 r6:851e7600 r5:85210000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ec980 INFO: task kworker/1:361:4166 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c29dc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:362:4168 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:362 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab0dd84 r8:00000002 r7:60000013 r6:eab0dd8c r5:85210c00 r4:85210c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85210c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85210c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe59000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8514638c r4:85146000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8514638c r4:851e2e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85210c00 r8:851e2eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2e80 r8:8027ed34 r7:eab01e60 r6:851e7680 r5:85210c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ecb00 INFO: task kworker/1:362:4168 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c29dc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:4170 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:85211800 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ecd00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85211800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85145b8c r4:85145800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85145b8c r4:851e2f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85211800 r8:851e2f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2f00 r8:8027ed34 r7:eab0de60 r6:851e7700 r5:85211800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851eccc0 INFO: task kworker/1:363:4170 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c2c41000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:4173 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:364 state:D stack:0 pid:4173 tgid:4173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:85212400 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ece00 r5:00001000 r4:eab13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85145f8c r4:85145c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85145f8c r4:851e2f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85212400 r8:851e2fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e2f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2f80 r8:8027ed34 r7:eab0de60 r6:851e7780 r5:85212400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ecc80 INFO: task kworker/1:364:4173 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c2c41000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:4174 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:4174 tgid:4174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85213000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:851f3000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ecf00 INFO: task kworker/1:365:4174 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c3256000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:4179 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaf1d84 r8:00000002 r7:60000113 r6:eaaf1d8c r5:85213c00 r4:85213c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85213c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85213c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff81000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850de78c r4:850de400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850de78c r4:851e7880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85213c00 r8:851e78ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851e7880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e7880 r8:8027ed34 r7:e0799e60 r6:851e7900 r5:85213c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84763c00 INFO: task kworker/0:158:4179 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c33d5000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:159 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851e7980 r8:8027ed34 r7:eaaf1e60 r6:851e7a00 r5:85214800 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851f3080 r8:8027ed34 r7:eab29e60 r6:851e7a80 r5:85215400 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:4183 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea991d84 r8:00000002 r7:60000113 r6:ea991d8c r5:85216000 r4:85216000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85216000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85216000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85146b8c r4:85146800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85146b8c r4:851f3100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85216000 r8:851f312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f3100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f3100 r8:8027ed34 r7:ea92de60 r6:851e7b00 r5:85216000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea991fb0 to 0xea991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f0440 INFO: task kworker/1:367:4183 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c3e1f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:00001000 r4:e00d1000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) Not tainted 6.15.0-syzkaller #0 r4:85216c00 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85216c00 r8:851e7bac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c3e1f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:161:4187 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea97dd84 r8:00000002 r7:60000113 r6:ea97dd8c r5:84400000 r4:84400000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84400000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84400000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850deb8c r4:850de800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850deb8c r4:851e7c80 r10:61c88647 r9:84400000 r8:851e7cac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:162:4190 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:162 state:D stack:0 pid:4190 tgid:4190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa05d84 r8:00000002 r7:60000013 r6:eaa05d8c r5:84400c00 r4:84400c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84400c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84400c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0557000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850df38c r4:850df000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850df38c r4:851e7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84400c00 r8:851e7dac r7:82804d40 r6:dddced40 r5:dddced60 r4:851e7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e7d80 r8:8027ed34 r7:ea9a1e60 r6:851e7e00 r5:84400c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c416a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab31e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b96f8c r4:84b96c00 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:4192 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab35d84 r8:00000002 r7:60000113 r6:eab35d8c r5:851a1800 r4:851a1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab35e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0609000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850df78c r4:850df400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850df78c r4:851e7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a1800 r8:851e7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e7f00 r8:8027ed34 r7:eab31e60 r6:851f3200 r5:851a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab35fb0 to 0xeab35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ef580 INFO: task kworker/0:164:4192 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd60: 800f0013 ffffffff r4:e05dddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:165 state:D stack:0 pid:4195 tgid:4195 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e0627000 r7:dddced40 r6:83018000 r5:850dfb8c r4:851e7f80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c48a2000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:4196 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:4196 tgid:4196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab45d84 r8:00000002 r7:60000013 r6:eab45d8c r5:851a2400 r4:851a2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851efa80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851ea000 r8:8027ed34 r7:eab31e60 r6:851f3300 r5:851a2400 r4:851ef880 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:167 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:851a3000 r4:851a3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851efb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0783000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ecb8c r4:841ec800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ecb8c r4:851ea080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3000 r8:851ea0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851ea080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ea080 r8:8027ed34 r7:eab31e60 r6:851f3380 r5:851a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ef9c0 INFO: task kworker/0:167:4198 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c4aae000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:851a5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:841ec78c r4:841ec400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ec78c r4:851ea100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a5400 r8:851ea12c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ea100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ea100 r8:8027ed34 r7:eab31e60 r6:851f3400 r5:851a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab55fb0 to 0xeab55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851efb40 INFO: task kworker/0:168:4200 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c4dcf000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:169:4203 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:169 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:851a4800 r4:851a4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851efd80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ec38c r4:841ec000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ec38c r4:851ea180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a4800 r8:851ea1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851ea180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ea180 r8:8027ed34 r7:eab31e60 r6:851f3480 r5:851a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 r4:84bbf300 Not tainted 6.15.0-syzkaller #0 r5:84401800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:851ea200 Exception stack(0xeaa19fb0 to 0xeaa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518e080 INFO: task kworker/0:170:4204 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c5529000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:84402400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518e1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84402400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88c1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510038c r4:85100000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510038c r4:851ea300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84402400 r8:851ea32c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ea300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ea300 r8:8027ed34 r7:eab31e60 r6:851ea380 r5:84402400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518e300 INFO: task kworker/0:171:4207 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84403000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84403000 r8:851ea42c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c5800000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:4211 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:4211 tgid:4211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab6dd84 r8:00000002 r7:60000113 r6:eab6dd8c r5:84403c00 r4:84403c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84403c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518e640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84403c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea901000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85100f8c r4:85100c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85100f8c r4:851ea500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84403c00 r8:851ea52c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8518e400 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:00000000 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84404800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518e700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84404800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea917000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510138c r4:85101000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510138c r4:851ea600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84404800 r8:851ea62c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ea600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ea600 r8:8027ed34 r7:eab6de60 r6:851ea680 r5:84404800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab71fb0 to 0xeab71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518e600 INFO: task kworker/0:174:4214 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c5a6c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:ea9e9d84 r8:00000002 r7:60000013 r6:ea9e9d8c r5:84405400 r5:84405400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518ea80 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:176:4216 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred r4:84406000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84406000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518e9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84406000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea931000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510178c r4:85101400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510178c r4:851ea800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84406000 r8:851ea82c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ea800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ea800 r8:8027ed34 r7:ea9e9e60 r6:851ea880 r5:84406000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518e740 INFO: task kworker/0:176:4216 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c6309000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:4219 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab7dd84 r8:00000002 r7:60000113 r6:eab7dd8c r5:849c0000 r4:849c0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c6309000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:4220 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:178 state:D stack:0 pid:4220 tgid:4220 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849c0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510278c r4:85102400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510278c r4:851eaa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0c00 r8:851eaa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851eaa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eaa00 r8:8027ed34 r7:eab7de60 r6:851eaa80 r5:849c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab81fb0 to 0xeab81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518ee00 INFO: task kworker/0:178:4220 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c6309000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:179:4223 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:179 state:D stack:0 pid:4223 tgid:4223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab85d84 r8:00000002 r7:60000013 r6:eab85d8c r5:849c1800 r4:849c1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851efdc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510238c r4:85102000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8510238c r4:851eab00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c1800 r8:851eab2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851eab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eab00 r8:8027ed34 r7:eab81e60 r6:851eab80 r5:849c1800 r4:00000001 Exception stack(0xeab85fb0 to 0xeab85ff8) Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:180 state:D stack:0 pid:4224 tgid:4224 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849c3000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849c3000 r8:851eac2c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85187080 INFO: task kworker/0:180:4224 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c6760000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:4227 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:849c2400 r4:849c2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85102f8c r4:85102c00 r4:851ead00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:849c4800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187680 r10:61c88647 r9:849c4800 r8:851eae2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:183:4230 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:183 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab95d84 r8:00000002 r7:60000113 r6:eab95d8c r5:849c5400 r4:849c5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa21000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85103f8c r4:85103c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85103f8c r4:851eaf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c5400 r8:851eaf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851eaf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851eaf00 r8:8027ed34 r7:eab8de60 r6:851eaf80 r5:849c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab95fb0 to 0xeab95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85187340 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:184:4232 blocked for more than 457 seconds. r4:849c6000 r5:849c6000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:4235 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:849c6c00 r4:849c6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849c6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85103b8c r4:85103800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85103b8c r4:8517e100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6c00 r8:8517e12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517e100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517e100 r8:8027ed34 r7:eab95e60 r6:8517e180 r5:849c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85187800 INFO: task kworker/0:185:4235 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c741c000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:186 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c7665000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:4239 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred r5:85220000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f0cc0 r5:8527478c r4:85274400 r10:61c88647 r9:85220000 r8:8517e32c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeab9dfb0 to 0xeab9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85187bc0 INFO: task kworker/0:187:4239 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c7838000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:188:4240 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:188 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabadd84 r8:00000002 r7:60000013 r6:eabadd8c r5:85220c00 r4:85220c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85220c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85220c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85274b8c r4:85274800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85274b8c r4:8517e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeabadfb0 to 0xeabadff8) INFO: task kworker/0:188:4240 is blocked on a mutex likely owned by task kworker/0:132:3787. dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:4243 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:4243 tgid:4243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabc1d84 r8:00000002 r7:60000113 r6:eabc1d8c r5:85221800 r4:85221800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85221800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85221800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:4244 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:85223000 r4:85223000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85223000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85223000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85146f8c r4:85146c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85146f8c r4:851f3500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c810d000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:4247 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:85222400 r4:85222400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85222400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85222400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527538c r4:85275000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527538c r4:8517e680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85222400 r8:8517e6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517e680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517e680 r8:8027ed34 r7:eabc1e60 r6:8517e700 r5:85222400 INFO: task kworker/0:190:4247 is blocked on a mutex likely owned by task kworker/0:132:3787. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85224800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d4c0 r10:00000000 r9:8517e780 r8:8027ed34 r7:eabbde60 r6:8517e800 r5:85224800 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r5:851a6000 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:851a6000 r8:8517e8ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d480 INFO: task kworker/0:192:4251 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c8d9a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:4253 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabfdd84 r8:00000002 r7:60000013 r6:eabfdd8c r5:851a3c00 r4:851a3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d680 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:851a3c00 r8:8517e92c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:193:4253 is blocked on a mutex likely owned by task kworker/0:132:3787. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:4255 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:851a8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517dbc0 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Call trace: r4:82ac21e4 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:195:4256 blocked for more than 457 seconds. [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:851a9800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d880 r5:8527638c r4:85276000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527638c r4:8517ea00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a9800 r8:8517ea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8517ea00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517ea00 r8:8027ed34 r7:eac05e60 r6:851f3700 r5:851a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac11fb0 to 0xeac11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d6c0 INFO: task kworker/0:195:4256 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c9044000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:196:4258 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:196 state:D stack:0 pid:4258 tgid:4258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabddd84 r8:00000002 r7:60000013 r6:eabddd8c r5:85225400 r4:85225400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85225400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517d940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85225400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527678c r4:85276400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527678c r4:8517ea80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85225400 r8:8517eaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517ea80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517ea80 r8:8027ed34 r7:eac05e60 r6:8517eb00 r5:85225400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517d7c0 INFO: task kworker/0:196:4258 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c95ed000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bdfb80 r4:84bbf300 r10:829187f4 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:85226000 r5:85226000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 Not tainted 6.15.0-syzkaller #0 r5:85226c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eff80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85226c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac39000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527778c r4:85277400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527778c r4:8517ec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85226c00 r8:8517ecac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517ec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517ec80 r8:8027ed34 r7:eac05e60 r6:8517ed00 r5:85226c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac1dfb0 to 0xeac1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517dc00 INFO: task kworker/0:198:4263 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c989e000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:4264 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:85223c00 r4:85223c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85223c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517de80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85223c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac33000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527738c r4:85277000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527738c r4:8517ed80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85223c00 r8:8517edac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517ed80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517ed80 r8:8027ed34 r7:eac1de60 r6:8517ee00 r5:85223c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8517dc00 INFO: task kworker/0:199:4264 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: c9bd9000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:200 state:D stack:0 pid:4267 tgid:4267 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84406c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05dddc0 r5:00001000 r4:e00d1000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eac45d84 r8:00000002 r7:60000013 r6:eac45d8c r5:85230000 r4:85230000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85230000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85230000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527c38c r4:8527c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527c38c r4:8517ef80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85230000 r8:8517efac r7:82804d40 r6:dddced40 r5:dddced60 r4:8517ef80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517ef80 r8:8027ed34 r7:eac31e60 r6:85155000 r5:85230000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515b340 INFO: task kworker/0:201:4274 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe05ddd20 to 0xe05ddd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:202:4276 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:202 state:D stack:0 pid:4276 tgid:4276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac5dd84 r8:00000002 r7:60000113 r6:eac5dd8c r5:85231800 r4:85231800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85231800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515b1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85231800 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85277f8c r4:85277c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85277f8c r4:85155080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85231800 r8:851550ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85155080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85155080 r8:8027ed34 r7:eac45e60 r6:85155100 r5:85231800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac5dfb0 to 0xeac5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515b340 INFO: task kworker/0:202:4276 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe05ddd20 to 0xe05ddd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/0:203:4277 blocked for more than 457 seconds. r5:85232400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:4278 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac65d84 r8:00000002 r7:60000013 r6:eac65d8c r5:85233000 r4:85233000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85233000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514d200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85233000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0539000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523c78c r4:8523c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523c78c r4:851f3780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85233000 r8:851f37ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f3780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f3780 r8:8027ed34 r7:ea92de60 r6:85155280 r5:85233000 Exception stack(0xeac65fb0 to 0xeac65ff8) [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85233c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85155300 r8:8027ed34 r7:eac61e60 r6:85155380 r5:85233c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:4281 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac71d84 r8:00000002 r7:60000113 r6:eac71d8c r5:85235400 r4:85235400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85235400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85235400 r8:851f382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r4:e05dddc0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-syzkaller #0 r5:85234800 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:85155480 r8:8027ed34 r7:eac69e60 r6:85155500 r5:85234800 Call trace: Exception stack(0xe05ddd20 to 0xe05ddd68) r4:e05dddc0 r4:00000000 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4284 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac7dd84 r8:00000002 r7:60000113 r6:eac7dd8c r5:85236000 r4:85236000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85236000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85236000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e046d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85147b8c r4:85147800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85147b8c r4:851f3880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85236000 r8:851f38ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f3880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f3880 r8:8027ed34 r7:eac65e60 r6:85155580 r5:85236000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85175000 INFO: task kworker/1:371:4284 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800f0013 r4:80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:372:4285 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4285 tgid:4285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac81d84 r8:00000002 r7:60000013 r6:eac81d8c r5:85236c00 r4:85236c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85236c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ecb40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85236c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85147f8c r4:85147c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85147f8c r4:851f3900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85236c00 r8:851f392c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f3900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f3900 r8:8027ed34 r7:eac65e60 r6:85155600 r5:85236c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac81fb0 to 0xeac81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:372:4285 is blocked on a mutex likely owned by task kworker/0:132:3787. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85230c00 r4:829187f0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:851f3980 r4:8514d100 Exception stack(0xe05ddd20 to 0xe05ddd68) r4:00000000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:4290 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:4290 tgid:4290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac8dd84 r8:00000002 r7:60000013 r6:eac8dd8c r5:852b0c00 r4:852b0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852b0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514d300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:8523cb8c r4:8523c800 r10:61c88647 r9:852b0c00 r8:851f3a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:852b1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514da80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa87000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523d38c r4:8523d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523d38c r4:851f3a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b1800 r8:851f3aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f3a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f3a80 r8:8027ed34 r7:eac8de60 r6:85155780 r5:852b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8514d1c0 INFO: task kworker/1:375:4291 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cb817000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:4293 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac89d84 r8:00000002 r7:60000013 r6:eac89d8c r5:851abc00 r4:851abc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851abc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514d700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4859000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523cf8c r4:8523cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523cf8c r4:851f3b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851abc00 r8:851f3b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f3b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f3b00 r8:8027ed34 r7:eac91e60 r6:851f3b80 r5:851abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8514d280 INFO: task kworker/1:376:4293 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cbf9f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:eac99d84 r8:00000002 r7:60000013 r6:eac99d8c r5:851ad400 r5:851ad400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516b180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e889f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527d38c r4:8527d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527d38c r4:85155800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ad400 r8:8515582c r7:82804d40 r6:dddced40 r5:dddced60 r4:85155800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85155800 r8:8027ed34 r7:eac69e60 r6:851f3c00 r5:851ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516b000 INFO: task kworker/0:206:4296 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cbf9f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:4299 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:4299 tgid:4299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:852b2400 r4:852b2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852b2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516b6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527df8c r4:8527dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527df8c r4:85155880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b2400 r8:851558ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85155880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85155880 r8:8027ed34 r7:eac99e60 r6:85155900 r5:852b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516b140 INFO: task kworker/0:207:4299 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cc1e1000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:4300 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:4300 tgid:4300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac3dd84 r8:00000002 r7:60000113 r6:eac3dd8c r5:852b3000 r4:852b3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852b3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516b3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88b9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527d78c r4:8527d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527d78c r4:85155980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b3000 r8:851559ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85155980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85155980 r8:8027ed34 r7:eac59e60 r6:85155a00 r5:852b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516b140 INFO: task kworker/0:208:4300 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:852b3c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523d78c r4:8523d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523d78c r4:851f3c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b3c00 r8:851f3cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f3c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f3c80 r8:8027ed34 r7:eac91e60 r6:85155a80 r5:852b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8514d900 INFO: task kworker/1:377:4302 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cc4cb000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:852b4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516b5c0 r10:61c88647 r9:852b4800 r8:85155b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8516b140 r4:00000000 r4:82ac21e4 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:852b5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaed000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527e38c r4:8527e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527e38c r4:85155c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b5400 r8:85155c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85155c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85155c00 r8:8027ed34 r7:eac59e60 r6:85155c80 r5:852b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516b640 INFO: task kworker/0:210:4307 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ccc0f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:852b6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:852b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8523db8c r4:851f3d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b6000 r8:851f3d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f3d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f3d00 r8:8027ed34 r7:eac9de60 r6:85155d00 r5:852b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8514db80 INFO: task kworker/1:378:4308 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cd0bd000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbf300 r10:829187f4 r9:eacb1d84 r8:00000002 r7:60000113 r6:eacb1d8c r5:852b6c00 r5:852b6c00 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:852b6c00 r8:851f3dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8514db80 Call trace: dd60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:852b0000 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8514de80 INFO: task kworker/1:380:4313 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cd352000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bdfb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a40000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514d800 r7:ddde2d40 r6:83018200 r5:8523e38c r4:851f3e80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05ddd20 to 0xe05ddd68) r4:e05dddc0 r5:84b96f8c r4:84b96c00 Exception stack(0xe05ddfb0 to 0xe05ddff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:851ae000 r4:829187f0 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab21000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523eb8c r4:8523e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523eb8c r4:851f3f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ae000 r8:851f3f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f3f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f3f00 r8:8027ed34 r7:eacb1e60 r6:851f3f80 r5:851ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc1fb0 to 0xeacc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8514d4c0 INFO: task kworker/1:382:4317 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cd68b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 dfa0: 00000000 00000000 00000000 00000000 r5:851aec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:851aec00 r8:85155f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8516ba80 INFO: task kworker/0:211:4318 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cdb7a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:851a8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8527eb8c r4:85155f80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:e05dddc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:4321 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:851ac800 r4:829187f0 r4:00000000 r5:00001000 r4:dfe2d000 r4:85095000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05ddd20 to 0xe05ddd68) r4:00000000 r4:84bdfb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab15000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523e78c r4:8523e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8523e78c r4:85095080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a6c00 r8:850950ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85095080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85095080 r8:8027ed34 r7:eacd1e60 r6:85093180 r5:851a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd9fb0 to 0xeacd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516bcc0 INFO: task kworker/0:214:4322 is blocked on a mutex likely owned by task kworker/0:132:3787. r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:215:4324 blocked for more than 458 seconds. r5:851b0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:4326 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eacadd84 r8:00000002 r7:60000113 r6:eacadd8c r5:84a40c00 r5:84a40c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfc13000 r4:00000001 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84a41800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a41800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd8d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523f78c r4:8523f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523f78c r4:85093280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a41800 r8:850932ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093280 r8:8027ed34 r7:eacade60 r6:85095280 r5:84a41800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508b8c0 Call trace: r4:82ac21e4 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:84a43000 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8523fb8c r4:8523f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523fb8c r4:85093300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a43000 r8:8509332c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093300 r8:8027ed34 r7:eab51e60 r6:85095300 r5:84a43000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508b840 INFO: task kworker/1:385:4332 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:82ac21e4 r4:00000000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a42400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:4337 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:4337 tgid:4337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eacf1d84 r8:00000002 r7:60000113 r6:eacf1d8c r5:84a43c00 r4:84a43c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a43c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84a43c00 r8:8509342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05ddfb0 to 0xe05ddff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a46000 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85093480 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8508bbc0 INFO: task kworker/1:388:4338 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cf63e000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84a45400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8508b680 Exception stack(0xe05ddd20 to 0xe05ddd68) r4:e05dddc0 r5:00001000 r4:e00d1000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:4343 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852b8c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524538c r4:85245000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524538c r4:85093580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b8c00 r8:850935ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093580 r8:8027ed34 r7:ead05e60 r6:85095580 r5:852b8c00 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:851b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r7:ddde2d40 r6:83018200 r5:85244f8c r4:85093600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: cff81000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:392:4348 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:392 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead09d84 r8:00000002 r7:60000113 r6:ead09d8c r5:851b2400 r4:851b2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524578c r4:85245400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524578c r4:85093700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b2400 r8:8509372c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093700 r8:8027ed34 r7:ead0de60 r6:85093780 r5:851b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead09fb0 to 0xead09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:393:4349 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:4349 tgid:4349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eacddd84 r8:00000002 r7:60000013 r6:eacddd8c r5:851b3000 r4:851b3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85245f8c r4:85245c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85245f8c r4:85093800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b3000 r8:8509382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093800 r8:8027ed34 r7:ead09e60 r6:85093880 r5:851b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05ddfb0 to 0xe05ddff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b3c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88d9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85245b8c r4:85245800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85245b8c r4:85093900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b3c00 r8:8509392c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093900 r8:8027ed34 r7:eacdde60 r6:85093980 r5:851b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead15fb0 to 0xead15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85150480 INFO: task kworker/1:394:4351 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d03c4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05ddfb0 to 0xe05ddff8) Workqueue: events bpf_prog_free_deferred r5:851b4800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851504c0 INFO: task kworker/1:395:4353 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d03c4000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4355 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4355 tgid:4355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead21d84 r8:00000002 r7:60000013 r6:ead21d8c r5:851b5400 r4:851b5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea921000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524678c r4:85246400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524678c r4:85093b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b5400 r8:85093b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093b00 r8:8027ed34 r7:ead1de60 r6:85093b80 r5:851b5400 Exception stack(0xead21fb0 to 0xead21ff8) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:397:4358 blocked for more than 458 seconds. r4:851b6000 r5:851b6000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea953000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85246b8c r4:85246800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85246b8c r4:85093c00 r10:61c88647 r9:851b6000 r8:85093c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:4359 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead2dd84 r8:00000002 r7:60000113 r6:ead2dd8c r5:851b6c00 r4:851b6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead2de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524738c r4:85247000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524738c r4:85093d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b6c00 r8:85093d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xead2dfb0 to 0xead2dff8) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d07f3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:4360 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:4360 tgid:4360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead19d84 r8:00000002 r7:60000113 r6:ead19d8c r5:851b1800 r4:851b1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851b1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85246f8c r4:85246c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:00001000 r4:e00d1000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:400:4363 blocked for more than 458 seconds. r5:851aa400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85247f8c r4:85247c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85247f8c r4:85093f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851aa400 r8:85093f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85093f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093f00 r8:8027ed34 r7:ead2de60 r6:85093f80 r5:851aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85150dc0 INFO: task kworker/1:400:4363 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d0e98000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:401 state:D stack:0 pid:4366 tgid:4366 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:851ab000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851ab000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524778c r4:85247400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524778c r4:85171000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:82ac21e4 r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852ba400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:852ba400 r8:8517112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:403 state:D stack:0 pid:4369 tgid:4369 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:ead49d84 r8:00000002 r7:60000113 r6:ead49d8c r5:852b9800 r4:852b9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852b9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524c38c r4:8524c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524c38c r4:85171180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b9800 r8:851711ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85171180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85171180 r8:8027ed34 r7:ead31e60 r6:85095680 r5:852b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead49fb0 to 0xead49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851790c0 INFO: task kworker/1:403:4369 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d14dc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 Exception stack(0xe05ddfb0 to 0xe05ddff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:852b8000 r5:852b8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eab19000 r7:ddde2d40 r6:83018200 r5:8524c78c r4:85171200 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:4374 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:4374 tgid:4374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead59d84 r8:00000002 r7:60000013 r6:ead59d8c r5:852bc800 r4:852bc800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852bc800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead59e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851795c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab49000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524cf8c r4:8524cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524cf8c r4:85171280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bc800 r8:851712ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85171280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85171280 r8:8027ed34 r7:ead55e60 r6:85095780 r5:852bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead59fb0 to 0xead59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85179280 INFO: task kworker/1:405:4374 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d1a3e000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:406 state:D stack:0 pid:4376 tgid:4376 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852bb000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r9:83018205 r8:852bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524cb8c r4:85171300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852bb000 r8:8517132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85171300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85171300 r8:8027ed34 r7:ead59e60 r6:85095800 r5:852bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead5dfb0 to 0xead5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85179700 INFO: task kworker/1:406:4376 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d209b000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:852bd400 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179a00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:851b8000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85179540 r4:e05dddc0 r5:84b96f8c r4:84b96c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:851b9800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524d78c r4:8524d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524d78c r4:85171500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b9800 r8:8517152c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85171500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85171500 r8:8027ed34 r7:ead61e60 r6:85171580 r5:851b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead65fb0 to 0xead65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85179680 INFO: task kworker/1:409:4381 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d2aa7000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851ba400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179c80 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:411:4385 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead71d84 r8:00000002 r7:60000013 r6:ead71d8c r5:851bb000 r4:851bb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851bb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524df8c r4:8524dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524df8c r4:85171700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bb000 r8:8517172c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85171700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85171700 r8:8027ed34 r7:ead69e60 r6:85171780 r5:851bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead71fb0 to 0xead71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85179a80 INFO: task kworker/1:411:4385 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d3107000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:412:4386 blocked for more than 458 seconds. r5:851bbc00 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:413:4389 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead75d84 r8:00000002 r7:60000013 r6:ead75d8c r5:851bc800 r4:851bc800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851bc800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead75e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85179e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabeb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524e78c r4:8524e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524e78c r4:85171900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bc800 r8:8517192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85171900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85171900 r8:8027ed34 r7:ead39e60 r6:85171980 r5:851bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead75fb0 to 0xead75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85094a80 INFO: task kworker/1:413:4389 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d3741000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) Call trace: r5:851bd400 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d2000 r10:00000000 r9:85171a00 r8:8027ed34 r7:ead39e60 r6:85171a80 r5:851bd400 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d3c8a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:851be000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:851be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851be000 r8:85171b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85171b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85171b00 r8:8027ed34 r7:ead79e60 r6:85171b80 r5:851be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d2140 INFO: task kworker/1:415:4393 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:851b8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:851b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r10:61c88647 r9:851b8c00 r8:85171c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05ddd20 to 0xe05ddd68) r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:4397 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:4397 tgid:4397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:851c0000 r4:851c0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851c0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d2440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524fb8c r4:8524f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524fb8c r4:85171d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c0000 r8:85171d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85171d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85171d00 r8:8027ed34 r7:ead85e60 r6:85171d80 r5:851c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead81fb0 to 0xead81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d2300 INFO: task kworker/1:417:4397 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d46c0000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r4:82ac21e4 r4:00000000 r5:84b96f8c r4:84b96c00 Exception stack(0xe05ddfb0 to 0xe05ddff8) Workqueue: events bpf_prog_free_deferred r5:851c0c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead89e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d2d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85258b8c r4:85258800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85258b8c r4:85171e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c0c00 r8:85171e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85171e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85171e00 r8:8027ed34 r7:ead81e60 r6:85171e80 r5:851c0c00 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 Workqueue: events bpf_prog_free_deferred r5:851c1800 r4:829187f0 r4:00000000 r9:83018205 r8:851c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 r10:00000000 r9:85171f00 r8:8027ed34 r7:ead89e60 r6:85171f80 r5:851c1800 INFO: task kworker/1:419:4401 is blocked on a mutex likely owned by task kworker/0:132:3787. [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:420:4402 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead95d84 r8:00000002 r7:60000113 r6:ead95d8c r5:851c2400 r4:851c2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851c2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d27c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead91000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525838c r4:85258000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525838c r4:851db000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c2400 r8:851db02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851db000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db000 r8:8027ed34 r7:ead89e60 r6:851db080 r5:851c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d2500 INFO: task kworker/1:420:4402 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d4a50000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:4405 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851c3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 INFO: task kworker/1:421:4405 is blocked on a mutex likely owned by task kworker/0:132:3787. r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851c4800 r5:851c4800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d2e40 r10:61c88647 r9:851c4800 r8:851db22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:852bec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r9:83018005 r8:852bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:216:4409 is blocked on a mutex likely owned by task kworker/0:132:3787. dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:423:4411 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:423 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadd1d84 r8:00000002 r7:60000013 r6:eadd1d8c r5:852be000 r4:852be000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852be000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:852be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525938c r4:85259000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525938c r4:851db300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852be000 r8:851db32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851db300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db300 r8:8027ed34 r7:eadade60 r6:85095a00 r5:852be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d2dc0 INFO: task kworker/1:423:4411 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 dd60: 800f0013 ffffffff r4:e05dddc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:4412 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:4412 tgid:4412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:852bbc00 r4:852bbc00 r5:852bbc00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:84bdfb80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:851bec00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cce00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:851bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527ff8c r4:8527fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8527ff8c r4:85095b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bec00 r8:85095b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85095b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85095b00 r8:8027ed34 r7:eacd1e60 r6:85095b80 r5:851bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851cca80 INFO: task kworker/0:217:4415 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bbf300 r5:84a46c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:00000001 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:4419 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eade5d84 r8:00000002 r7:60000113 r6:eade5d8c r5:84a44800 r4:84a44800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a44800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851da480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a44800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff4f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85259b8c r4:85259800 r10:61c88647 r9:84a44800 r8:851db4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 Exception stack(0xe05ddfb0 to 0xe05ddff8) task:kworker/1:427 state:D stack:0 pid:4423 tgid:4423 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851da780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a58000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525a78c r4:8525a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525a78c r4:851db500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a58000 r8:851db52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851db500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db500 r8:8027ed34 r7:eadede60 r6:85095d00 r5:84a58000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851da500 INFO: task kworker/1:427:4423 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:82ac21e4 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa4dd84 r8:00000002 r7:60000113 r6:eaa4dd8c r5:84a58c00 r4:84a58c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a58c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85327400 r10:00000000 r9:85095d80 r8:8027ed34 r7:eacd1e60 r6:85095e00 r5:84a58c00 r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 Exception stack(0xe05ddfb0 to 0xe05ddff8) Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e88c7000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525bb8c r4:8525b800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8525bb8c r4:85095e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a59800 r8:85095eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85095e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85095e80 r8:8027ed34 r7:eaa4de60 r6:85095f00 r5:84a59800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851cc640 INFO: task kworker/0:219:4426 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d66f7000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:82ac21e4 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 Exception stack(0xe05ddfb0 to 0xe05ddff8) Workqueue: events bpf_prog_free_deferred r5:84a5a400 r4:829187f0 r4:00000000 r9:83018205 r8:84a5a400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 Exception stack(0xe05ddfb0 to 0xe05ddff8) Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0687000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525ab8c r4:8525a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525ab8c r4:851db600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5c800 r8:851db62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851db600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db600 r8:8027ed34 r7:eac51e60 r6:851e1000 r5:84a5c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae0dfb0 to 0xeae0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851da880 INFO: task kworker/1:429:4431 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d6a25000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:430 state:D stack:0 pid:4432 tgid:4432 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a5d400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851da9c0 r5:8525af8c r4:8525ac00 r7:ddde2d40 r6:83018200 r5:8525af8c r4:851db680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5d400 r8:851db6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851db680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db680 r8:8027ed34 r7:eae0de60 r6:851e1080 r5:84a5d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851da880 INFO: task kworker/1:430:4432 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d722f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:4435 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae1dd84 r8:00000002 r7:60000113 r6:eae1dd8c r5:84a5ec00 r5:84a5ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dad00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8899000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525b78c r4:8525b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525b78c r4:851db700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5ec00 r8:851db72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851db700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db700 r8:8027ed34 r7:eae11e60 r6:851e1100 r5:84a5ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851daa00 INFO: task kworker/1:431:4435 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:4436 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae21d84 r8:00000002 r7:60000013 r6:eae21d8c r5:852c8000 r4:852c8000 r5:852c8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 800f0013 ffffffff r4:e05dddc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05ddfb0 to 0xe05ddff8) Not tainted 6.15.0-syzkaller #0 r5:852c8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525bf8c r4:8525bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525bf8c r4:851db800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8c00 r8:851db82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851db800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db800 r8:8027ed34 r7:eae1de60 r6:851e1200 r5:852c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851daa00 INFO: task kworker/1:433:4438 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d7761000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:852c9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e62c0 r5:8525cf8c r4:8525cc00 r4:851db880 9fa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 task:kworker/0:220 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852ca400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85327500 r5:852a438c r4:852a4000 r4:851e1300 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:4443 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae2dd84 r8:00000002 r7:60000113 r6:eae2dd8c r5:852cb000 r4:852cb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852cb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dafc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa99000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525c38c r4:8525c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525c38c r4:851db900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cb000 r8:851db92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851db900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db900 r8:8027ed34 r7:eae29e60 r6:851e1400 r5:852cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851daa00 INFO: task kworker/1:435:4443 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d7ebc000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:852cbc00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525c78c r4:8525c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525c78c r4:851db980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cbc00 r8:851db9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851db980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851db980 r8:8027ed34 r7:eae29e60 r6:851e1480 r5:852cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae31fb0 to 0xeae31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e6100 INFO: task kworker/1:436:4446 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:852cc800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525cb8c r4:8525c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525cb8c r4:851dba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cc800 r8:851dba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851dba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dba00 r8:8027ed34 r7:eae29e60 r6:851e1500 r5:852cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae35fb0 to 0xeae35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e6100 INFO: task kworker/1:437:4447 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d8636000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 r5:84b96f8c r4:84b96c00 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:852cec00 r5:852cec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd20: d8a84000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:84a5e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:851dbb00 dfa0: 00000000 00000000 00000000 00000000 dd60: 800f0013 ffffffff r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 Exception stack(0xe05ddfb0 to 0xe05ddff8) Workqueue: events bpf_prog_free_deferred r5:84a5bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525db8c r4:8525d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525db8c r4:851dbb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5bc00 r8:851dbbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851dbb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dbb80 r8:8027ed34 r7:eae4de60 r6:851e1680 r5:84a5bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e63c0 INFO: task kworker/1:440:4453 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d8a84000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:4455 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae5dd84 r8:00000002 r7:60000013 r6:eae5dd8c r5:852cd400 r4:852cd400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852cd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae5de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:4457 blocked for more than 459 seconds. task:kworker/1:442 state:D stack:0 pid:4457 tgid:4457 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852ce000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:852ce000 r8:851dbcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84978c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6d80 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84978c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae77000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525ef8c r4:8525ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525ef8c r4:851dbd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84978c00 r8:851dbd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851dbd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dbd00 r8:8027ed34 r7:eae5de60 r6:851e1800 r5:84978c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae6dfb0 to 0xeae6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e6a80 INFO: task kworker/1:443:4459 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d95b0000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:444 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84978000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84978000 r8:851dbdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e68c0 INFO: task kworker/1:444:4461 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d95b0000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:4463 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:eae15d84 r8:00000002 r7:60000013 r6:eae15d8c r5:851c6000 r5:851c6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6c00 r5:8525eb8c r4:8525e800 r10:61c88647 r9:851c6000 r8:851dbe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: d9bb8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8497b000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8497b000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaecf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525fb8c r4:8525f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525fb8c r4:851dbf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497b000 r8:851dbf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851dbf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dbf00 r8:8027ed34 r7:eae6de60 r6:851e1900 r5:8497b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e6cc0 INFO: task kworker/1:446:4466 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: d9bb8000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e05dddc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:4467 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:4467 tgid:4467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaeb9d84 r8:00000002 r7:60000013 r6:eaeb9d8c r5:84979800 r4:84979800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84979800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84979800 r8:851dbfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:84b96f8c r4:84b96c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf300 INFO: task kworker/1:448:4470 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eaec9d84 r8:00000002 r7:60000013 r6:eaec9d8c r5:8497bc00 r4:8497bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851de280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8497bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525f78c r4:8525f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525f78c r4:85320000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497bc00 r8:8532002c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320000 r8:8027ed34 r7:eaeb1e60 r6:851e1a00 r5:8497bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e6f80 INFO: task kworker/1:448:4470 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: da4ad000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:4471 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaecdd84 r8:00000002 r7:60000113 r6:eaecdd8c r5:8497c800 r4:8497c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:450 state:D stack:0 pid:4474 tgid:4474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:8497d400 r4:8497d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8497d400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeeb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526038c r4:85260000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526038c r4:85320100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497d400 r8:8532012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320100 r8:8027ed34 r7:eaecde60 r6:851e1b00 r5:8497d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85323180 INFO: task kworker/1:450:4474 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: dadb3000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r4:e05dddc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 INFO: task kworker/1:451:4475 blocked for more than 459 seconds. r4:8497e000 r5:8497e000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8497e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa11000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85260f8c r4:85260c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85260f8c r4:85320180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497e000 r8:853201ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320180 r8:8027ed34 r7:eaee9e60 r6:851e1b80 r5:8497e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85323300 INFO: task kworker/1:451:4475 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: db243000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae91d84 r8:00000002 r7:60000013 r6:eae91d8c r5:8497ec00 r4:8497ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85327a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8497ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4f8c r4:852a4c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a4f8c r4:851e1c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497ec00 r8:851e1c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851e1c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e1c00 r8:8027ed34 r7:eac55e60 r6:851e1c80 r5:8497ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae91fb0 to 0xeae91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r4:e05dddc0 r5:00001000 r4:e00d1000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:4479 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:4479 tgid:4479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae9dd84 r8:00000002 r7:60000113 r6:eae9dd8c r5:8497a400 r4:8497a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8526078c r4:85260400 r4:85320200 dfa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/0:222:4482 blocked for more than 459 seconds. r5:84a5b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:851e1d80 r8:8027ed34 r7:eae91e60 r6:851e1e00 r5:84a5b000 INFO: task kworker/0:222:4482 is blocked on a mutex likely owned by task kworker/0:132:3787. [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:4483 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf0dd84 r8:00000002 r7:60000113 r6:eaf0dd8c r5:852d8000 r4:852d8000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85327940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf0f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4b8c r4:852a4800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a4b8c r4:851e1e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d8000 r8:851e1eac r7:82804d40 r6:dddced40 r5:dddced60 r4:851e1e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e1e80 r8:8027ed34 r7:eae91e60 r6:851e1f00 r5:852d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85327680 INFO: task kworker/0:223:4483 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe05ddd20 to 0xe05ddd68) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:852d8c00 r5:852d8c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851e1f80 r8:8027ed34 r7:eae91e60 r6:851ff000 r5:852d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853279c0 INFO: task kworker/0:224:4486 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: db9fb000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:453 state:D stack:0 pid:4488 tgid:4488 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852d9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85260b8c r4:85260800 r4:85320280 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:4490 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:4490 tgid:4490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf19d84 r8:00000002 r7:60000113 r6:eaf19d8c r5:852da400 r4:852da400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852da400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: dbde0000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:4493 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:852dbc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:455:4496 blocked for more than 459 seconds. r5:852de000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85320380 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:e00d1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:456:4497 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:4497 tgid:4497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf45d84 r8:00000002 r7:60000113 r6:eaf45d8c r5:852db000 r4:852db000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852db000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85327f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852db000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526238c r4:85262000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526238c r4:85320400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852db000 r8:8532042c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320400 r8:8027ed34 r7:eaf41e60 r6:851ff300 r5:852db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf45fb0 to 0xeaf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85323c40 INFO: task kworker/1:456:4497 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: dc484000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:457 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851c5400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85261b8c r4:85320480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r5:84b96f8c r4:84b96c00 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4500 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:851c3000 r4:851c3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851c3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323fc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0715000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85261f8c r4:85261c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85261f8c r4:85320580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c3000 r8:853205ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320580 r8:8027ed34 r7:eaf45e60 r6:85320600 r5:851c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf3dfb0 to 0xeaf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85323d80 INFO: task kworker/1:458:4500 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: dc731000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 r4:00000000 r5:00001000 r4:e00d1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851c6c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851de380 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:852e8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478a300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88bf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526278c r4:85262400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526278c r4:85320780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e8000 r8:853207ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320780 r8:8027ed34 r7:eaf49e60 r6:85320800 r5:852e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85327e80 INFO: task kworker/1:460:4505 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: dd014000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:461:4508 blocked for more than 460 seconds. r5:852e8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85326040 r7:ddde2d40 r6:83018200 r5:85262f8c r4:85320880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:462:4510 blocked for more than 460 seconds. r5:852e9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf5de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853261c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea937000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526338c r4:85263000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526338c r4:85320980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e9800 r8:853209ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320980 r8:8027ed34 r7:eaf51e60 r6:85320a00 r5:852e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf5dfb0 to 0xeaf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85326300 INFO: task kworker/1:462:4510 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: dd431000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:463:4511 blocked for more than 460 seconds. r5:852eb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r5:00001000 r4:e00d1000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:4513 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf69d84 r8:00000002 r7:60000113 r6:eaf69d8c r5:852ec800 r4:852ec800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852ec800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fea00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a5f8c r4:852a5c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852a5f8c r4:851ff380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ec800 r8:851ff3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851ff380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ff380 r8:8027ed34 r7:eaf19e60 r6:85320b80 r5:852ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fe840 INFO: task kworker/0:226:4513 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: dd7b7000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:464 state:D stack:0 pid:4515 tgid:4515 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852dc800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85320c00 5fa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) dd20: ddc54000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:4516 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852dec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852a6b8c r4:852a6800 r10:00000000 r9:851ff480 r8:8027ed34 r7:eaf69e60 r6:851ff500 r5:852dec00 INFO: task kworker/0:227:4516 is blocked on a mutex likely owned by task kworker/0:132:3787. Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: ddc54000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:465:4520 blocked for more than 460 seconds. r5:848b0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85263f8c r4:85263c00 r4:85320c80 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 800f0013 ffffffff r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:4522 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf81d84 r8:00000002 r7:60000013 r6:eaf81d8c r5:848b2400 r4:848b2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848b2400 r8:85320d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 r4:e05dddc0 r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:467:4524 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:4524 tgid:4524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:848b3000 r4:848b3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85326b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab47000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526c38c r4:8526c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526c38c r4:85320d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b3000 r8:85320dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320d80 r8:8027ed34 r7:eaf81e60 r6:851ff680 r5:848b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85326900 INFO: task kworker/1:467:4524 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: de4ca000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 Workqueue: events bpf_prog_free_deferred r5:848b1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85326c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526c78c r4:8526c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526c78c r4:85320e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b1800 r8:85320e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320e00 r8:8027ed34 r7:eaf81e60 r6:851ff700 r5:848b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85326ac0 INFO: task kworker/1:468:4526 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: de813000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e00d1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:469 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848b0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8526cf8c r4:8526cc00 r7:ddde2d40 r6:83018200 r5:8526cf8c r4:85320e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b0000 r8:85320eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320e80 r8:8027ed34 r7:eaf81e60 r6:851ff780 r5:848b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85326cc0 INFO: task kworker/1:469:4528 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: debe6000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:470 state:D stack:0 pid:4530 tgid:4530 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848b4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85320f00 r8:8027ed34 r7:eaf95e60 r6:851ff800 r5:848b4800 r4:85326e40 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:84bbf300 task:kworker/1:471 state:D stack:0 pid:4531 tgid:4531 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848b5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851da0c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526d38c r4:8526d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526d38c r4:85320f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:85320fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85320f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85320f80 r8:8027ed34 r7:eaf99e60 r6:851ff880 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85326ac0 INFO: task kworker/1:471:4531 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: debe6000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 r4:84bdfb80 Exception stack(0xe05ddfb0 to 0xe05ddff8) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eafa9d84 r8:00000002 r7:60000113 r6:eafa9d8c r5:848b3c00 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85339080 INFO: task kworker/1:472:4534 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: debe6000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 r4:84bbf300 task:kworker/1:473 state:D stack:0 pid:4535 tgid:4535 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852ebc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac19000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526db8c r4:8526d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526db8c r4:85336080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ebc00 r8:853360ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85336080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85336080 r8:8027ed34 r7:eaf99e60 r6:85336100 r5:852ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853392c0 INFO: task kworker/1:473:4535 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: df28a000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:4538 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:4538 tgid:4538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:852ee000 r5:852ee000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8526e78c r4:8526e400 r4:85336180 5fa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:475 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339440 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85339300 INFO: task kworker/1:475:4539 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450000 r8:80200be4 r7:e05ddd54 r6:ffffffff r5:84450000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: dfa3f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b96f8c r4:84b96c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfb80 r8:8027ed34 r7:e05cde60 r6:84bdfc00 r5:84450000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:4542 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:4542 tgid:4542 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:852ed400 r5:852ed400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853396c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05ddd20 to 0xe05ddd68) dd20: dfa3f000 e00ab000 00000001 80239bb8 7f5e3000 00000001 82ac21c4 82ac15a0 dd40: 7f5e3000 e00ab000 8280c9b4 e05ddd9c e05ddda0 e05ddd70 80230af4 80239bd0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05dddc0 r5:e05dde08 r4:e05dddc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05ddfb0 to 0xe05ddff8) INFO: task kworker/1:477:4544 blocked for more than 460 seconds. r10:829187f4 r9:eafb9d84 r8:00000002 r7:60000013 r6:eafb9d8c r5:852ea400 r5:852ea400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8526ef8c r4:85336480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:84b96f8c r4:84bdfb80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84bbf300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:4546 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafbdd84 r8:00000002 r7:60000113 r6:eafbdd8c r5:852f0000 r4:852f0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526f38c r4:8526f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526f38c r4:85336580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f0000 r8:853365ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85336580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85336580 r8:8027ed34 r7:eafb9e60 r6:85336600 r5:852f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85339780 INFO: task kworker/1:478:4546 is blocked on a mutex likely owned by task kworker/0:132:3787. task:kworker/0:132 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r10:61c88647 r9:84450000 r8:84bdfbac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:479 state:D stack:0 pid:4549 tgid:4549 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852f0c00 r4:829187f0 r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85336680 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85339a00 INFO: task kworker/1:479:4549 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 7f2af000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 900f0013 ffffffff r5:900f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:228 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852f1800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:4551 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4551 tgid:4551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:852f2400 r4:852f2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85339b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8526fb8c r4:85336800 r10:00000000 r9:85336800 r8:8027ed34 r7:eafc5e60 r6:85336880 r5:852f2400 INFO: task kworker/1:480:4551 is blocked on a mutex likely owned by task kworker/0:133:3790. [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 7f5f5000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 900f0013 ffffffff r5:900f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:4555 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafc9d84 r8:00000002 r7:60000013 r6:eafc9d8c r5:852f3000 r4:852f3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851febc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d60: 900f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 INFO: task kworker/1:482:4556 blocked for more than 460 seconds. r4:852f3c00 r5:852f3c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85326640 r5:8539c38c r4:8539c000 r4:85336a00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 7fa40000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 900f0013 ffffffff r5:900f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:4557 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:4557 tgid:4557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eafd5d84 r8:00000002 r7:60000013 r6:eafd5d8c r5:852f4800 r5:852f4800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85336b00 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05e5dc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:484 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852f6000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8539cf8c r4:85336c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f6000 r8:85336c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85336c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85336c00 r8:8027ed34 r7:eafd5e60 r6:85336c80 r5:852f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85351080 INFO: task kworker/1:484:4559 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 7ff04000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 900f0013 ffffffff r5:900f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4560 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4560 tgid:4560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:852f6c00 r5:852f6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Call trace: r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:852f8c00 r5:852f8c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539cb8c r4:8539c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539cb8c r4:85336e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f8c00 r8:85336e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85336e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85336e00 r8:8027ed34 r7:eafdde60 r6:85336e80 r5:852f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe5fb0 to 0xeafe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85351380 INFO: task kworker/1:486:4562 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 80468000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:4566 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:4566 tgid:4566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaff1d84 r8:00000002 r7:60000013 r6:eaff1d8c r5:852f9800 r4:852f9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85351700 r7:ddde2d40 r6:83018200 r5:8539d38c r4:85336f00 Exception stack(0xeaff1fb0 to 0xeaff1ff8) r4:85351340 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:852f8000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r9:83018205 r8:852f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 r10:61c88647 r9:852f8000 r8:8534e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeaff9fb0 to 0xeaff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85351640 INFO: task kworker/1:488:4568 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 806d7000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:4569 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:4569 tgid:4569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb005d84 r8:00000002 r7:60000013 r6:eb005d8c r5:852fa400 r5:852fa400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:490 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852fbc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8534e200 Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85351080 INFO: task kworker/1:490:4570 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 81109000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:4574 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb021d84 r8:00000002 r7:60000013 r6:eb021d8c r5:852fd400 r5:852fd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533fbc0 r7:ddde2d40 r6:83018200 r5:852a678c r4:8534e300 Exception stack(0xeb021fb0 to 0xeb021ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:4576 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:4576 tgid:4576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb025d84 r8:00000002 r7:60000013 r6:eb025d8c r5:852fe000 r4:852fe000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852fe000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853462c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539e78c r4:8539e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539e78c r4:8534e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fe000 r8:8534e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e400 r8:8027ed34 r7:eb021e60 r6:8534e480 r5:852fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853518c0 INFO: task kworker/1:492:4576 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 815ee000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:4578 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:852fb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533fdc0 r7:dddced40 r6:83018000 r5:852a6f8c r4:851ffa00 Exception stack(0xeb039fb0 to 0xeb039ff8) INFO: task kworker/0:229:4578 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:493 state:D stack:0 pid:4580 tgid:4580 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852fc800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85346c00 r7:ddde2d40 r6:83018200 r5:8539f38c r4:8534e580 Exception stack(0xeb03dfb0 to 0xeb03dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85346180 INFO: task kworker/1:493:4580 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 81832000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:4581 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:4581 tgid:4581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb031d84 r8:00000002 r7:60000013 r6:eb031d8c r5:852f5400 r4:852f5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852f5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8539eb8c r4:8534e680 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85309800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85309800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536678c r4:85366400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8536678c r4:851ffa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85309800 r8:851ffaac r7:82804d40 r6:dddced40 r5:dddced60 r4:851ffa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ffa80 r8:8027ed34 r7:eb039e60 r6:8534e780 r5:85309800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb051fb0 to 0xeb051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8533fe00 INFO: task kworker/0:230:4584 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 823c1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:231:4585 blocked for more than 460 seconds. r5:8530a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852a7f8c r4:852a7c00 r4:851ffb00 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:4587 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb065d84 r8:00000002 r7:60000013 r6:eb065d8c r5:85308000 r4:85308000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85308000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85346880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85308000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539ef8c r4:8539ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539ef8c r4:8534e880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308000 r8:8534e8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534e880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e880 r8:8027ed34 r7:eb03de60 r6:8534e900 r5:85308000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:8530b000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85346cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb06b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539f78c r4:8539f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539f78c r4:8534e980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530b000 r8:8534e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534e980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e980 r8:8027ed34 r7:eb03de60 r6:8534ea00 r5:8530b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb061fb0 to 0xeb061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85346a40 INFO: task kworker/1:496:4589 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:4591 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:4591 tgid:4591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb079d84 r8:00000002 r7:60000013 r6:eb079d8c r5:8530c800 r4:8530c800 r5:8530c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:497:4591 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 r4:8530d400 r5:8530d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8539ff8c r4:8539fc00 r4:8534eb80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:499 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85308c00 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85341280 INFO: task kworker/1:499:4595 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 83028000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:4597 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:4597 tgid:4597 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae39d84 r8:00000002 r7:60000013 r6:eae39d8c r5:8530e000 r4:8530e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8530e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530e000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:853e138c r4:8534ed80 Exception stack(0xeae39fb0 to 0xeae39ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:852fec00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb093000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e078c r4:853e0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e078c r4:8534ee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fec00 r8:8534eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534ee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ee80 r8:8027ed34 r7:eae39e60 r6:8534ef00 r5:852fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb091fb0 to 0xeb091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85341600 INFO: task kworker/1:501:4599 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 83597000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85310c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853e0b8c r4:853e0800 r10:61c88647 r9:85310c00 r8:8534efac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 83597000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:503:4602 blocked for more than 460 seconds. r5:85311800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e0f8c r4:853e0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e0f8c r4:85344080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85311800 r8:853440ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85344080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344080 r8:8027ed34 r7:eae39e60 r6:85344100 r5:85311800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae41fb0 to 0xeae41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85341c00 INFO: task kworker/1:503:4602 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 83a3e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r5:85313000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r9:83018205 r8:85313000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r10:61c88647 r9:85313000 r8:853441ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85341f40 Exception stack(0xe05e5d20 to 0xe05e5d68) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85310000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85345180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85310000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4801000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e1f8c r4:853e1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e1f8c r4:85344280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85310000 r8:853442ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85344280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344280 r8:8027ed34 r7:eb0a1e60 r6:85344300 r5:85310000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85346700 INFO: task kworker/1:505:4607 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 83ec9000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:00001000 r4:e00df000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85314800 r5:85314800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:853e1b8c r4:853e1800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:506:4609 is blocked on a mutex likely owned by task kworker/0:133:3790. r4:82ac21e4 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bbf4c0 task:kworker/1:507 state:D stack:0 pid:4611 tgid:4611 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85315400 r8:853444ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85345140 INFO: task kworker/1:507:4611 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 84474000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:4612 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85316000 r5:85316000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:85345140 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:509 state:D stack:0 pid:4615 tgid:4615 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85313c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85345a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85313c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e2f8c r4:853e2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e2f8c r4:85344680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85313c00 r8:853446ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85344680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344680 r8:8027ed34 r7:eb0ade60 r6:85344700 r5:85313c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b5fb0 to 0xeb0b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85345640 INFO: task kworker/1:509:4615 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 84d1d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8530bc00 r5:8530bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac21e4 r4:e05e5dc0 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:511 state:D stack:0 pid:4619 tgid:4619 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85312400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85345c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85312400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e338c r4:853e3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e338c r4:85344880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85312400 r8:853448ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85344880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344880 r8:8027ed34 r7:eb0b5e60 r6:85344900 r5:85312400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85345800 INFO: task kworker/1:511:4619 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 84f03000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:512:4622 blocked for more than 461 seconds. r5:85319800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85345d80 r7:ddde2d40 r6:83018200 r5:853e378c r4:85344980 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r5:00001000 r4:e00df000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:4623 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0c5d84 r8:00000002 r7:60000013 r6:eb0c5d8c r5:8531a400 r4:8531a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8531a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533c040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531a400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e3b8c r4:853e3800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853e3b8c r4:85344a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531a400 r8:85344aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85344a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344a80 r8:8027ed34 r7:eb0c1e60 r6:85344b00 r5:8531a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:4625 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0c9d84 r8:00000002 r7:60000113 r6:eb0c9d8c r5:8531b000 r4:8531b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8531b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533c2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531b000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac93000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853e3f8c r4:853e3c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8531b000 r8:85344bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8531bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533c640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f038c r4:853f0000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f038c r4:85344c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531bc00 r8:85344cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85344c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344c80 r8:8027ed34 r7:eb0c9e60 r6:85344d00 r5:8531bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8533c280 INFO: task kworker/1:515:4627 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85318000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85318c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533c800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85318c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae43000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f078c r4:853f0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f078c r4:85344e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85318c00 r8:85344eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85344e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344e80 r8:8027ed34 r7:eb0cde60 r6:85344f00 r5:85318c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8533c600 INFO: task kworker/1:517:4631 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 85cdf000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:518 state:D stack:0 pid:4633 tgid:4633 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8531d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eae51000 r7:ddde2d40 r6:83018200 r5:853f0b8c r4:85344f80 Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8531c800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 86491000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:520:4637 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:520 state:D stack:0 pid:4637 tgid:4637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0e1d84 r8:00000002 r7:60000013 r6:eb0e1d8c r5:8531e000 r4:8531e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8531e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f178c r4:853f1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f178c r4:85335180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531e000 r8:853351ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) INFO: task kworker/1:520:4637 is blocked on a mutex likely owned by task kworker/0:133:3790. r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:521:4638 blocked for more than 461 seconds. r4:8530ec00 r5:8530ec00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533f6c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8533ca80 INFO: task kworker/1:521:4638 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 868aa000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:4641 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85410000 r5:85410000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853f138c r4:853f1000 r4:85335380 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:4643 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0f5d84 r8:00000002 r7:60000113 r6:eb0f5d8c r5:85410c00 r4:85410c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85410c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85351c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85410c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb10f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ed78c r4:841ed400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841ed78c r4:851ffb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:8533f540 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 task:kworker/1:523 state:D stack:0 pid:4646 tgid:4646 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0f9d84 r8:00000002 r7:60000113 r6:eb0f9d8c r5:85411800 r4:85411800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85411800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532c4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85411800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f1b8c r4:853f1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f1b8c r4:85335500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85411800 r8:8533552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85335500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335500 r8:8027ed34 r7:eb0e1e60 r6:85335580 r5:85411800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f9fb0 to 0xeb0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8532c000 INFO: task kworker/1:523:4646 is blocked on a mutex likely owned by task kworker/0:133:3790. Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:524:4647 blocked for more than 461 seconds. r5:85413000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:841edb8c r4:85335600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85413000 r8:8533562c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85335600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335600 r8:8027ed34 r7:eb0f9e60 r6:85335680 r5:85413000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0fdfb0 to 0xeb0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8532c000 INFO: task kworker/1:524:4647 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 86f34000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:525 state:D stack:0 pid:4650 tgid:4650 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85413c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 86f34000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:4652 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:526 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:85415400 r4:85415400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85415400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85416000 r4:829187f0 r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335900 r8:8027ed34 r7:eb105e60 r6:85335980 r5:85416000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8532c6c0 INFO: task kworker/1:527:4653 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 87631000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:4656 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb10dd84 r8:00000002 r7:60000013 r6:eb10dd8c r5:85416c00 r4:85416c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85416c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eaf2f000 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e05e5dc0 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:233:4657 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:85316c00 r4:85316c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85316c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85316c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb115000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536438c r4:85364000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8536438c r4:851ffc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85316c00 r8:851ffc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ffc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ffc00 r8:8027ed34 r7:eb051e60 r6:85335b00 r5:85316c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853518c0 INFO: task kworker/0:233:4657 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 r5:84b9738c r4:84b97000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85412400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:85412400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f2b8c r4:853f2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f2b8c r4:85335b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85412400 r8:85335bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85335b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335b80 r8:8027ed34 r7:eb105e60 r6:85335c00 r5:85412400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8532cc80 INFO: task kworker/1:529:4659 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 87e71000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Not tainted 6.15.0-syzkaller #0 r4:8531ec00 r5:8531ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:8531ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 r10:61c88647 r9:8531ec00 r8:85335cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r4:00000000 r5:84b9738c r4:84b97000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:531 state:D stack:0 pid:4664 tgid:4664 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85418c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fb000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85418c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f338c r4:853f3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f338c r4:85335d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85418c00 r8:85335dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85335d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85335d80 r8:8027ed34 r7:eb135e60 r6:851ffc80 r5:85418c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fb0c0 INFO: task kworker/1:531:4664 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8817a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84972400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84972400 r8:85335e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 883b3000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:4667 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:4667 tgid:4667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84973000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:e05e5dc0 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:4670 tgid:4670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb165d84 r8:00000002 r7:60000113 r6:eb165d8c r5:84973c00 r4:84973c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84973c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fb640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84973c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fc38c r4:853fc000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fc38c r4:85335e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851fb2c0 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:534 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85419800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85419800 r8:85335f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:4674 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:4674 tgid:4674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb16dd84 r8:00000002 r7:60000113 r6:eb16dd8c r5:8541a400 r4:8541a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fb700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb175000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fc78c r4:853fc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fc78c r4:8532b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541a400 r8:8532b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532b000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532b000 r8:8027ed34 r7:eb165e60 r6:8532b080 r5:8541a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fb480 INFO: task kworker/1:535:4674 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 89037000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8541b000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8532b100 r8:8027ed34 r7:eb16de60 r6:8532b180 r5:8541b000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:4678 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb119d84 r8:00000002 r7:60000113 r6:eb119d8c r5:8541bc00 r4:8541bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fb840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb183000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853fcb8c r4:853fc800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:537:4678 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:4679 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb191d84 r8:00000002 r7:60000013 r6:eb191d8c r5:84974800 r4:84974800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84974800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fbac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84974800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb189000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fcf8c r4:853fcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fcf8c r4:8532b300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84974800 r8:8532b32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532b300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532b300 r8:8027ed34 r7:eb179e60 r6:851fff00 r5:84974800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:4682 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1c5d84 r8:00000002 r7:60000013 r6:eb1c5d8c r5:84975400 r5:84975400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853fd78c r4:853fd400 r4:8532b380 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84976c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85350040 r5:853fdf8c r4:853fdc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851fbbc0 INFO: task kworker/1:540:4684 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 89b5d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:541:4685 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:541 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8541c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8532b480 r8:8027ed34 r7:eb1d5e60 r6:8532b500 r5:8541c800 INFO: task kworker/1:541:4685 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:542:4688 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:542 state:D stack:0 pid:4688 tgid:4688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1c1d84 r8:00000002 r7:60000113 r6:eb1c1d8c r5:8541d400 r4:8541d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853501c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1eb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fe38c r4:853fe000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fe38c r4:8532b580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541d400 r8:8532b5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532b580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532b580 r8:8027ed34 r7:eb1d5e60 r6:8532b600 r5:8541d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c1fb0 to 0xeb1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:4690 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1e9d84 r8:00000002 r7:60000113 r6:eb1e9d8c r5:8541e000 r4:8541e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8541e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85350380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8541e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fe78c r4:853fe400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fe78c r4:8532b680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541e000 r8:8532b6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532b680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532b680 r8:8027ed34 r7:eb1c1e60 r6:8532b700 r5:8541e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85350180 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:8541ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:8541ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0f7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb215000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fef8c r4:853fec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fef8c r4:8532b780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8541ec00 r8:8532b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532b780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532b780 r8:8027ed34 r7:eb1e9e60 r6:8532b800 r5:8541ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85350340 INFO: task kworker/1:544:4692 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8a137000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:545 state:D stack:0 pid:4693 tgid:4693 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85414800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:853feb8c r4:853fe800 r4:8532b880 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:4696 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb219d84 r8:00000002 r7:60000113 r6:eb219d8c r5:85420c00 r4:85420c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85420c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb219e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85420c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85364b8c r4:85364800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85364b8c r4:85349080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85420c00 r8:853490ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85349080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349080 r8:8027ed34 r7:eb051e60 r6:8532b980 r5:85420c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb219fb0 to 0xeb219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85328880 INFO: task kworker/0:235:4696 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 INFO: task kworker/1:546:4699 blocked for more than 461 seconds. r4:85422400 r5:85422400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85350c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85422400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ff78c r4:853ff400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ff78c r4:8532ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85422400 r8:8532ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532ba00 r8:8027ed34 r7:eb1f5e60 r6:8532ba80 r5:85422400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853508c0 INFO: task kworker/1:546:4699 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8b021000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:4700 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1fdd84 r8:00000002 r7:60000113 r6:eb1fdd8c r5:84970c00 r4:84970c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84970c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:547 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84976000 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84976000 r8:8532bb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 task:kworker/1:548 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafa1d84 r8:00000002 r7:60000013 r6:eafa1d8c r5:84970000 r4:84970000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84970000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85350d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84970000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa29000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ffb8c r4:853ff800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ffb8c r4:8532bb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84970000 r8:8532bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532bb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532bb80 r8:8027ed34 r7:eb225e60 r6:85349280 r5:84970000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa1fb0 to 0xeafa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85350bc0 INFO: task kworker/1:548:4704 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8b5fc000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:549 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84971800 r4:829187f0 r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8532bc00 r8:8027ed34 r7:eafa1e60 r6:85349300 r5:84971800 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:4708 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:848b6000 r4:848b6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85350e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fff8c r4:853ffc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fff8c r4:8532bc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b6000 r8:8532bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532bc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532bc80 r8:8027ed34 r7:eb049e60 r6:85349380 r5:848b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85350e80 INFO: task kworker/1:550:4708 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:848b6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ce80 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8532bd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532bd00 r8:8027ed34 r7:eb049e60 r6:85349400 r5:848b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853506c0 INFO: task kworker/1:551:4709 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8ba71000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r5:84b9738c r4:84b97000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:852dd400 r4:852dd400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852dd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533f040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:852dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0633000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540478c r4:85404400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540478c r4:8532bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852dd400 r8:8532bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532bd80 r8:8027ed34 r7:eb049e60 r6:85349480 r5:852dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85350ec0 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8ba71000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84990000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85358240 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb23dfb0 to 0xeb23dff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85423000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540578c r4:85405400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540578c r4:8532be80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85423000 r8:8532beac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8532be80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532be80 r8:8027ed34 r7:eb23de60 r6:8532bf00 r5:85423000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85358200 INFO: task kworker/1:554:4715 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8c236000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:555 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85420000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853584c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r4:00000000 r5:84b9738c r4:84b97000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85423c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85405f8c r4:85405c00 r10:61c88647 r9:85423c00 r8:8534b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4722 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb251d84 r8:00000002 r7:60000113 r6:eb251d8c r5:85421800 r4:85421800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85421800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85358a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85405b8c r4:85405800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85405b8c r4:8534b180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85421800 r8:8534b1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534b180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b180 r8:8027ed34 r7:eb24de60 r6:8534b200 r5:85421800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84991800 r5:84991800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85349580 Exception stack(0xeb245fb0 to 0xeb245ff8) INFO: task kworker/0:237:4725 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8c8b6000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4727 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4727 tgid:4727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb259d84 r8:00000002 r7:60000013 r6:eb259d8c r5:84992400 r4:84992400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84992400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85358d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84992400 r8:8534b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:559 state:D stack:0 pid:4729 tgid:4729 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84993000 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85358c80 INFO: task kworker/1:559:4729 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8d286000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:4731 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4731 tgid:4731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:84994800 r4:84994800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84994800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 INFO: task kworker/1:561:4733 blocked for more than 462 seconds. r5:84996c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:4735 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb255d84 r8:00000002 r7:60000113 r6:eb255d8c r5:85424800 r4:85424800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85424800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac27000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85406f8c r4:85406c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85406f8c r4:8534b480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85424800 r8:8534b4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534b480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b480 r8:8027ed34 r7:eb265e60 r6:8534b500 r5:85424800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb255fb0 to 0xeb255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85348080 INFO: task kworker/1:562:4735 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85426c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:4739 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb279d84 r8:00000002 r7:60000113 r6:eb279d8c r5:85418000 r4:85418000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85418000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85418000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540778c r4:85407400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540778c r4:8534b680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85418000 r8:8534b6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534b680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b680 r8:8027ed34 r7:eb265e60 r6:8534b700 r5:85418000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853484c0 INFO: task kworker/1:564:4739 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84995400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84995400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85357bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84995400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadaf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548878c r4:85488400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8548878c r4:85349880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84995400 r8:853498ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85349880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349880 r8:8027ed34 r7:eb051e60 r6:85349900 r5:84995400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb241fb0 to 0xeb241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85357880 INFO: task kworker/0:238:4741 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:565:4743 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:565 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb27dd84 r8:00000002 r7:60000013 r6:eb27dd8c r5:84993c00 r4:84993c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84993c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853486c0 r5:85407b8c r4:85407800 r10:61c88647 r9:84993c00 r8:8534b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:566 state:D stack:0 pid:4745 tgid:4745 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84996000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853489c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84990c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85488f8c r4:85488c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85488f8c r4:8534b880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84990c00 r8:8534b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534b880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b880 r8:8027ed34 r7:eb281e60 r6:85349a80 r5:84990c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb285fb0 to 0xeb285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85348800 INFO: task kworker/1:567:4747 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8e7ac000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348c00 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb275fb0 to 0xeb275ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05e5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85428c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf75000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85489b8c r4:85489800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85489b8c r4:85349b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85428c00 r8:85349bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85349b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349b80 r8:8027ed34 r7:eb051e60 r6:85349c00 r5:85428c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb28dfb0 to 0xeb28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85357c40 INFO: task kworker/0:239:4751 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8e9d4000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:4752 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb291d84 r8:00000002 r7:60000013 r6:eb291d8c r5:85429800 r4:85429800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85429800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85429800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r4:8534b980 Exception stack(0xeb291fb0 to 0xeb291ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4755 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:8542bc00 r4:8542bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8542bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548938c r4:85489000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548938c r4:8534ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542bc00 r8:8534ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ba00 r8:8027ed34 r7:eb291e60 r6:85349d00 r5:8542bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85348e00 INFO: task kworker/1:570:4755 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8f21a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:571 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eaf83000 r7:ddde2d40 r6:83018200 r5:85489f8c r4:8534bb00 Exception stack(0xeb289fb0 to 0xeb289ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:4760 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2a9d84 r8:00000002 r7:60000113 r6:eb2a9d8c r5:8542d400 r4:8542d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8542d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85483ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8542d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb193000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85365f8c r4:85365c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85365f8c r4:85349e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542d400 r8:85349e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85349e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85349e00 r8:8027ed34 r7:eb051e60 r6:85349e80 r5:8542d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85357f40 INFO: task kworker/0:240:4760 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r4:84bdfc80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542e000 r8:8534bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bc00 r8:8027ed34 r7:eb291e60 r6:85349f00 r5:8542e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535a080 INFO: task kworker/1:573:4763 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8f8bf000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:4764 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:4764 tgid:4764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2a1d84 r8:00000002 r7:60000013 r6:eb2a1d8c r5:85425400 r4:85425400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85425400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a200 r5:8548a78c r4:8548a400 r4:8534bc80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:e00df000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:4767 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:4767 tgid:4767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2b1d84 r8:00000002 r7:60000113 r6:eb2b1d8c r5:85430000 r4:85430000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85430000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85430000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafeb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548ab8c r4:8548a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548ab8c r4:8534bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85430000 r8:8534bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8534bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bd80 r8:8027ed34 r7:eb2b5e60 r6:8534be00 r5:85430000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8fd64000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb011000 r5:8548b38c r4:8548b000 r4:8534be80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a880 r5:8548b78c r4:8548b400 r4:8534bf80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:4772 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:4772 tgid:4772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:85432400 r4:85432400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85432400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535aa00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85432400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548bb8c r4:8548b800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548bb8c r4:85452000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85432400 r8:8545202c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85452000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85452000 r8:8027ed34 r7:eb2bde60 r6:85452100 r5:85432400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535a6c0 INFO: task kworker/1:578:4772 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 90770000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:579:4775 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:85433000 r4:85433000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85433000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ab80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85433000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb041000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548bf8c r4:8548bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548bf8c r4:85452180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85433000 r8:854521ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85452180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85452180 r8:8027ed34 r7:eb2c1e60 r6:85452200 r5:85433000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535a940 INFO: task kworker/1:579:4775 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 90770000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:4777 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb06f000 r4:00000001 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:4778 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:4778 tgid:4778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2c9d84 r8:00000002 r7:60000113 r6:eb2c9d8c r5:85434800 r4:85434800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85434800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ad00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85434800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb04d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548c38c r4:8548c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548c38c r4:85452380 r4:85452380 Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:4783 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2d9d84 r8:00000002 r7:60000013 r6:eb2d9d8c r5:85436000 r4:85436000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85436000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545c180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85436000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548cf8c r4:8548cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548cf8c r4:85452500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85436000 r8:8545252c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85452500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85452500 r8:8027ed34 r7:eb2cde60 r6:85452600 r5:85436000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545c2c0 INFO: task kworker/1:583:4783 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 91241000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:82ac21e4 r4:00000000 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:584 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85436c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85436c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545c340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85436c00 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff51000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548d38c r4:8548d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548d38c r4:85452680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85436c00 r8:854526ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85452680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85452680 r8:8027ed34 r7:eb2d9e60 r6:85452700 r5:85436c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545c140 INFO: task kworker/1:584:4785 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 915ae000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:4787 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:4787 tgid:4787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb08dd84 r8:00000002 r7:60000113 r6:eb08dd8c r5:85438000 r4:85438000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85438000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545c6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85438000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548db8c r4:8548d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548db8c r4:85452780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85438000 r8:854527ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85452780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85452780 r8:8027ed34 r7:eb2dde60 r6:85452800 r5:85438000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb08dfb0 to 0xeb08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545c300 INFO: task kworker/1:585:4787 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:4789 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:4789 tgid:4789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:85438c00 r4:85438c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85438c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545c500 r4:00000000 r5:00001000 r4:e04b1000 r7:ddde2d40 r6:83018200 r5:8548d78c r4:85452880 Exception stack(0xeb099fb0 to 0xeb099ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545c800 r7:ddde2d40 r6:83018200 r5:8548df8c r4:85452980 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545c4c0 INFO: task kworker/1:587:4791 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 91ed1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:4793 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb22dd84 r8:00000002 r7:60000113 r6:eb22dd8c r5:8543a400 r4:8543a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8543a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545c980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8543a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85452a80 r8:8027ed34 r7:eb17de60 r6:85452b00 r5:8543a400 r4:8545c780 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 91ed1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:4795 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eaac1000 r7:ddde2d40 r6:83018200 r5:8548e78c r4:85452b80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb2e5d84 r8:00000002 r7:60000013 r6:eb2e5d8c r5:8543bc00 r4:8543bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8543bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545ca40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8543bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548eb8c r4:8548e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548eb8c r4:85452c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543bc00 r8:85452cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85452c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85452c80 r8:8027ed34 r7:eb2e1e60 r6:85452d00 r5:8543bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545ca40 INFO: task kworker/1:590:4797 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 922c0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b9738c r4:84b97000 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:591:4799 blocked for more than 462 seconds. r10:829187f4 r9:eb2e9d84 r8:00000002 r7:60000013 r6:eb2e9d8c r5:8543c800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545cd40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548ef8c r4:8548ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548ef8c r4:85452d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543c800 r8:85452dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85452d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85452d80 r8:8027ed34 r7:eb2e5e60 r6:85452e00 r5:8543c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545cbc0 INFO: task kworker/1:591:4799 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 92727000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:4801 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8543d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae07000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548f78c r4:8548f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548f78c r4:85452e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543d400 r8:85452eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85452e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85452e80 r8:8027ed34 r7:eb2e9e60 r6:85452f00 r5:8543d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545ccc0 INFO: task kworker/1:592:4801 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 92727000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb2f1d84 r8:00000002 r7:60000113 r6:eb2f1d8c r5:8543e000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535af40 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85452f80 Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800f0013 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:4805 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:4805 tgid:4805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:8543ec00 r4:8543ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8543ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854740c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8543ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae45000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548fb8c r4:8548f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8548fb8c r4:85472080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543ec00 r8:854720ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472080 r8:8027ed34 r7:eb2ede60 r6:85472100 r5:8543ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05e5d20 to 0xe05e5d68) r4:e05e5dc0 r4:00000000 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:595 state:D stack:0 pid:4807 tgid:4807 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eae59000 r10:61c88647 r9:8542c800 r8:8547222c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:4809 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb309d84 r8:00000002 r7:60000013 r6:eb309d8c r5:84918000 r4:84918000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84918000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84918000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf03000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85498f8c r4:85498c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85498f8c r4:85472180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84918000 r8:854721ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472180 r8:8027ed34 r7:eb301e60 r6:8547e000 r5:84918000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85474200 INFO: task kworker/1:596:4809 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9385f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb30dd84 r8:00000002 r7:60000113 r6:eb30dd8c r5:84918c00 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474480 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85472280 r8:8027ed34 r7:eb309e60 r6:8547e080 r5:84918c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 93d23000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:599:4814 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:4814 tgid:4814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb319d84 r8:00000002 r7:60000013 r6:eb319d8c r5:8491b000 r4:8491b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8491b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85498b8c r4:85498800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85498b8c r4:85472400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491b000 r8:8547242c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb319fb0 to 0xeb319ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:600:4816 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:600 state:D stack:0 pid:4816 tgid:4816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb31dd84 r8:00000002 r7:60000113 r6:eb31dd8c r5:8491bc00 r4:8491bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8491bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf31000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549978c r4:85499400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549978c r4:85472380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491bc00 r8:854723ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472380 r8:8027ed34 r7:eb309e60 r6:8547e200 r5:8491bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 INFO: task kworker/1:601:4819 blocked for more than 462 seconds. r5:8491c800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474a00 r5:8549938c r4:85499000 r10:00000000 r9:85472480 r8:8027ed34 r7:eb31de60 r6:8547e280 r5:8491c800 r4:85474b40 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:4821 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb32dd84 r8:00000002 r7:60000113 r6:eb32dd8c r5:8491d400 r4:8491d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb32de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8491d400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb095000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85499b8c r4:85499800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85499b8c r4:85472500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491d400 r8:8547252c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472500 r8:8027ed34 r7:eb31de60 r6:8547e300 r5:8491d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb32dfb0 to 0xeb32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85474980 INFO: task kworker/1:602:4821 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Not tainted 6.15.0-syzkaller #0 r4:8491e000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb339fb0 to 0xeb339ff8) Workqueue: events bpf_prog_free_deferred 5d20: 94726000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:604:4826 blocked for more than 462 seconds. r4:8542a400 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85474dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8542a400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85499f8c r4:85499c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85499f8c r4:85472600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542a400 r8:8547262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472600 r8:8027ed34 r7:eb339e60 r6:8547e400 r5:8542a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85474d40 INFO: task kworker/1:604:4826 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 94d94000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:4827 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb109000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85472680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472680 r8:8027ed34 r7:eb339e60 r6:8547e480 r5:8542ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb345fb0 to 0xeb345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85474d40 INFO: task kworker/1:605:4827 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 94d94000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb34dd84 r8:00000002 r7:60000013 r6:eb34dd8c r5:8491ec00 r4:8491ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478aa40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8491ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb123000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8549a78c r4:8549a400 r4:85472700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:800f0013 r4:80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84779040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85441800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549ab8c r4:8549a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549ab8c r4:85472780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85441800 r8:854727ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472780 r8:8027ed34 r7:eb339e60 r6:85472800 r5:85441800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84779080 INFO: task kworker/1:607:4831 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 95301000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:608 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb13f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549af8c r4:8549ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549af8c r4:85472880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85443000 r8:854728ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472880 r8:8027ed34 r7:eb339e60 r6:85472900 r5:85443000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb351fb0 to 0xeb351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84779180 INFO: task kworker/1:608:4834 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 95535000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:4836 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:609 state:D stack:0 pid:4836 tgid:4836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2d5d84 r8:00000002 r7:60000113 r6:eb2d5d8c r5:85442400 r4:85442400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85442400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84779540 r5:8549b78c r4:8549b400 r4:85472980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:4838 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb355d84 r8:00000002 r7:60000013 r6:eb355d8c r5:85445400 r4:85445400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85445400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84779740 r5:8549bb8c r4:8549b800 r4:85472a80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d32c0 r7:ddde2d40 r6:83018200 r5:854a0f8c r4:85472b80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9590d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:4842 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb359d84 r8:00000002 r7:60000013 r6:eb359d8c r5:85444800 r4:85444800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85444800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84779a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85444800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb171000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549bf8c r4:8549bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8549bf8c r4:85472d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85444800 r8:85472d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472d00 r8:8027ed34 r7:eb35de60 r6:85472d80 r5:85444800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b9738c r4:84b97000 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb379d84 r8:00000002 r7:60000113 r6:eb379d8c r5:85446c00 r4:85446c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85446c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84779c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85446c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb181000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a078c r4:854a0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a078c r4:85472e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85446c00 r8:85472e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472e00 r8:8027ed34 r7:eb35de60 r6:85472e80 r5:85446c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb379fb0 to 0xeb379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84779a80 INFO: task kworker/1:613:4844 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 962a0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:4845 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85440c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85440c00 r8:8547e5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85483a80 INFO: task kworker/0:241:4845 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 965e8000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:614:4848 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:4848 tgid:4848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85440000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85440000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a0b8c r4:854a0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a0b8c r4:85472f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85440000 r8:85472fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472f80 r8:8027ed34 r7:eb35de60 r6:84760000 r5:85440000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84779e80 INFO: task kworker/1:614:4848 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 965e8000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:4849 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb391d84 r8:00000002 r7:60000113 r6:eb391d8c r5:854c8c00 r4:854c8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 r10:61c88647 r9:854c8c00 r8:8547e62c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:243:4851 blocked for more than 462 seconds. r4:853b0000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484a540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb513000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85367f8c r4:85367c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85367f8c r4:8547e700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b0000 r8:8547e72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8547e700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547e700 r8:8027ed34 r7:dfa45e60 r6:8547e780 r5:853b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb361fb0 to 0xeb361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85483dc0 INFO: task kworker/0:243:4851 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 96a36000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e00df000 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:853b1800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:4857 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:4857 tgid:4857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3a5d84 r8:00000002 r7:60000113 r6:eb3a5d8c r5:853b3c00 r4:853b3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa23000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a1b8c r4:854a1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a1b8c r4:84760100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b3c00 r8:8476012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84760100 r8:8027ed34 r7:eb39de60 r6:8547e880 r5:853b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a5fb0 to 0xeb3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d33c0 INFO: task kworker/1:616:4857 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 96ef5000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:617:4859 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:617 state:D stack:0 pid:4859 tgid:4859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3add84 r8:00000002 r7:60000113 r6:eb3add8c r5:853b2400 r4:853b2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a178c r4:854a1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a178c r4:84760180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b2400 r8:847601ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84760180 r8:8027ed34 r7:eb3a5e60 r6:8547e900 r5:853b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3adfb0 to 0xeb3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d33c0 INFO: task kworker/1:617:4859 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9731d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:854a278c r4:84760200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b5400 r8:8476022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84760200 r8:8027ed34 r7:eb3a5e60 r6:8547e980 r5:853b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b1fb0 to 0xeb3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d3500 INFO: task kworker/1:618:4860 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 976e4000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:854a1f8c r4:854a1c00 Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:4864 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3c1d84 r8:00000002 r7:60000013 r6:eb3c1d8c r5:853b6000 r4:853b6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853b6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a238c r4:854a2000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a238c r4:84760300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84760300 r8:8027ed34 r7:eb3b1e60 r6:8547ea80 r5:853b6000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d37c0 INFO: task kworker/1:620:4864 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 97a31000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:00001000 r4:e00df000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8491a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead43000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a378c r4:854a3400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a378c r4:84760380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491a400 r8:847603ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84760380 r8:8027ed34 r7:eb3b1e60 r6:8547eb00 r5:8491a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d3900 INFO: task kworker/1:621:4867 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 97cbb000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a2b8c r4:854a2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a2b8c r4:84760400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b3000 r8:8476042c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84760400 r8:8027ed34 r7:eb3cde60 r6:8547eb80 r5:853b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d3a80 INFO: task kworker/1:622:4869 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800f0013 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 INFO: task kworker/1:623:4870 blocked for more than 463 seconds. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:854a2f8c r4:854a2c00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:82ac21e4 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:4873 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3d9d84 r8:00000002 r7:60000113 r6:eb3d9d8c r5:854ca400 r4:854ca400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ca400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3ddd84 r8:00000002 r7:60000113 r6:eb3ddd8c r5:854cb000 r4:854cb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a5400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a878c r4:854a8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a878c r4:84760680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cb000 r8:847606ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84760680 r8:8027ed34 r7:eb3cde60 r6:84760700 r5:854cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d3f40 INFO: task kworker/1:625:4875 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9867f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854834c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:627:4878 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:627 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3e5d84 r8:00000002 r7:60000113 r6:eb3e5d8c r5:854cd400 r4:854cd400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eadb7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:84b9738c r4:84b97000 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:628:4879 blocked for more than 463 seconds. r4:854ce000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a5180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a838c r4:854a8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a838c r4:84760980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ce000 r8:847609ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84760980 r8:8027ed34 r7:eb3dde60 r6:84760a00 r5:854ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84779e80 INFO: task kworker/1:628:4879 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 98e30000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:4884 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:4884 tgid:4884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3f1d84 r8:00000002 r7:60000013 r6:eb3f1d8c r5:854cec00 r4:854cec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a5a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:854a938c r4:84760b80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 991d9000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:4887 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:4887 tgid:4887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3f9d84 r8:00000002 r7:60000113 r6:eb3f9d8c r5:85443c00 r4:85443c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85443c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843267c0 r4:00000000 r9:83018005 r8:85443c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800f0013 ffffffff [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:854d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a978c r4:854a9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a978c r4:84760d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d8c00 r8:84760d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84760d00 r8:8027ed34 r7:eb3f1e60 r6:84760d80 r5:854d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3fdfb0 to 0xeb3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a5200 INFO: task kworker/1:631:4889 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 99704000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:632:4891 blocked for more than 463 seconds. r4:854da400 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:854da400 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 99893000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:4893 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:4893 tgid:4893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3e1d84 r8:00000002 r7:60000013 r6:eb3e1d8c r5:848f0c00 r4:848f0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854aa38c r4:854aa000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854aa38c r4:84760f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f0c00 r8:84760f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84760f00 r8:8027ed34 r7:eb2f9e60 r6:8547ec80 r5:848f0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b9738c r4:84b97000 r4:84bdfc80 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:634:4896 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:634 state:D stack:0 pid:4896 tgid:4896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb331d84 r8:00000002 r7:60000013 r6:eb331d8c r5:848f1800 r4:848f1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84779ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a9f8c r4:854a9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854a9f8c r4:84760f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f1800 r8:84760fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84760f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb405d84 r8:00000002 r7:60000113 r6:eb405d8c r5:848f3000 r4:848f3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84326ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae57000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536778c r4:85367400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8536778c r4:8547ed80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f3000 r8:8547edac r7:82804d40 r6:dddced40 r5:dddced60 r4:8547ed80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547ed80 r8:8027ed34 r7:eb361e60 r6:8547ee00 r5:848f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84326940 INFO: task kworker/0:245:4899 is blocked on a mutex likely owned by task kworker/0:133:3790. Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e00df000 r5:84b9738c r4:84b97000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:854aa78c r4:854aa400 r10:00000000 r9:8487d000 r8:8027ed34 r7:eb3e1e60 r6:8547ee80 r5:848f3c00 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:636:4902 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:636 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:848f2400 r4:848f2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847492c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac75000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854aab8c r4:854aa800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854aab8c r4:8487d080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f2400 r8:8487d0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487d080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487d080 r8:8027ed34 r7:eb409e60 r6:8547ef00 r5:848f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb411fb0 to 0xeb411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84749080 INFO: task kworker/1:636:4902 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a208000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:637:4904 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:637 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:848f5400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847494c0 r5:854aaf8c r4:854aac00 r4:8487d100 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a426000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:4908 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb40dd84 r8:00000002 r7:60000113 r6:eb40dd8c r5:848f6c00 r4:848f6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484a440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb501000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85367b8c r4:85367800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85367b8c r4:847df080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f6c00 r8:847df0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847df080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847df080 r8:8027ed34 r7:eb361e60 r6:847df100 r5:848f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84326e80 INFO: task kworker/0:246:4908 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a6c6000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:4910 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:639 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb41dd84 r8:00000002 r7:60000113 r6:eb41dd8c r5:848f4800 r4:848f4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ab78c r4:854ab400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ab78c r4:8487d200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f4800 r8:8487d22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:8487d200 r8:8027ed34 r7:eb419e60 r6:847df180 r5:848f4800 r4:847495c0 INFO: task kworker/1:639:4910 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9aeda000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:640 state:D stack:0 pid:4912 tgid:4912 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:848f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854abf8c r4:854abc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854abf8c r4:8487d300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b0c00 r8:8487d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487d300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487d300 r8:8027ed34 r7:eb421e60 r6:847df280 r5:853b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb425fb0 to 0xeb425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84749880 INFO: task kworker/1:641:4914 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9aeda000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 r5:84b9738c r4:84b97000 r4:84bdfc80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a60000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb057000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b0f8c r4:854b0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b0f8c r4:8487d380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a60000 r8:8487d3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487d380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487d380 r8:8027ed34 r7:eb425e60 r6:847df300 r5:84a60000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb42dfb0 to 0xeb42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84749980 INFO: task kworker/1:642:4916 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9aeda000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:84b9738c r4:84b97000 r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb431fb0 to 0xeb431ff8) r4:84749980 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:644:4919 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:644 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:84a62400 r4:84a62400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a62400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb439fb0 to 0xeb439ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:645:4921 blocked for more than 463 seconds. r5:854d8000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84749d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb043000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b0b8c r4:854b0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b0b8c r4:8487d500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d8000 r8:8487d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487d500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487d500 r8:8027ed34 r7:eb42de60 r6:8487d580 r5:854d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb401fb0 to 0xeb401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84749c40 INFO: task kworker/1:645:4921 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9b8f6000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:4924 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb113000 r10:61c88647 r9:854dbc00 r8:8487d62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84749cc0 INFO: task kworker/1:646:4924 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9ba27000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:4925 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3f5d84 r8:00000002 r7:60000013 r6:eb3f5d8c r5:854dc800 r4:854dc800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854dc800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a5d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r5:00001000 r4:eb07b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b138c r4:854b1000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b138c r4:8487d700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dc800 r8:8487d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487d700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487d700 r8:8027ed34 r7:eb43de60 r6:8487d780 r5:854dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84749cc0 INFO: task kworker/1:647:4925 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9ba27000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r4:e05e5dc0 r4:00000000 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:4928 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb451e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb087000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb0e9000 r7:ddde2d40 r6:83018200 r5:854b1b8c r4:8487d880 Exception stack(0xeb459fb0 to 0xeb459ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:4932 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:4932 tgid:4932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb461d84 r8:00000002 r7:60000013 r6:eb461d8c r5:84a63000 r4:84a63000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a63000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b3bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a63000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b3f8c r4:854b3c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b3f8c r4:8487d900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a63000 r8:8487d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:8487d900 r8:8027ed34 r7:eb43de60 r6:847df580 r5:84a63000 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:4933 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb465d84 r8:00000002 r7:60000013 r6:eb465d8c r5:84a66000 r4:84a66000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a66000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b3280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a66000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a66000 r8:8487d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05e5d20 to 0xe05e5d68) r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:652 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:854b278c r4:8487da00 r4:00000001 r4:847b32c0 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:4937 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:4937 tgid:4937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb475d84 r8:00000002 r7:60000113 r6:eb475d8c r5:84a61800 r4:84a61800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a61800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b3540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a61800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b2b8c r4:854b2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b2b8c r4:8487da80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a61800 r8:8487daac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487da80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487da80 r8:8027ed34 r7:eb461e60 r6:847df700 r5:84a61800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:654:4939 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:4939 tgid:4939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb47dd84 r8:00000002 r7:60000113 r6:eb47dd8c r5:84a66c00 r4:84a66c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a66c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b34c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb169000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b2f8c r4:854b2c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a66c00 r8:8487db2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b34c0 INFO: task kworker/1:654:4939 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9d0ab000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b36c0 INFO: task kworker/1:655:4941 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9d0ab000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:656:4943 blocked for more than 463 seconds. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:853c0000 r8:8487dc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487dc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487dc00 r8:8027ed34 r7:eb461e60 r6:847df880 r5:853c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb48dfb0 to 0xeb48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b37c0 INFO: task kworker/1:656:4943 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9d429000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:657 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:854b3b8c r4:8487dc80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb49dd84 r8:00000002 r7:60000013 r6:eb49dd8c r5:853c2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b3f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ed000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b478c r4:854b4400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b478c r4:8487dd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c2400 r8:8487dd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487dd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487dd00 r8:8027ed34 r7:eb461e60 r6:847df980 r5:853c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb49dfb0 to 0xeb49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b3b40 INFO: task kworker/1:658:4948 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9da1a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:659:4949 blocked for more than 464 seconds. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:eb1dd000 r7:ddde2d40 r6:83018200 r5:854b438c r4:8487dd80 Exception stack(0xeb491fb0 to 0xeb491ff8) r4:847b3b40 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:4953 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:4953 tgid:4953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb449d84 r8:00000002 r7:60000013 r6:eb449d8c r5:854dec00 r4:854dec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854dec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9b000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b4b8c r4:854b4800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b4b8c r4:8487de80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dec00 r8:8487deac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487de80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487de80 r8:8027ed34 r7:eb49de60 r6:8487df00 r5:854dec00 Exception stack(0xeb449fb0 to 0xeb449ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:661 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9b380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854db000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb207000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b4f8c r4:854b4c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b4f8c r4:8487df80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854db000 r8:8487dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8487df80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487df80 r8:8027ed34 r7:eb449e60 r6:854c5000 r5:854db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9b100 INFO: task kworker/1:661:4954 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9e07d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9b440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb213000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b538c r4:854b5000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b538c r4:854c5080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dd400 r8:854c50ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854c5080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5080 r8:8027ed34 r7:eb4a1e60 r6:854c5100 r5:854dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9b0c0 INFO: task kworker/1:662:4957 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:663 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:4960 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4a5d84 r8:00000002 r7:60000013 r6:eb4a5d8c r5:84433c00 r4:84433c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84433c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9b940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84433c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb299000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b5f8c r4:854b5c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b5f8c r4:854c5280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84433c00 r8:854c52ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854c5280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5280 r8:8027ed34 r7:eb4a9e60 r6:854c5300 r5:84433c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9b700 INFO: task kworker/1:664:4960 is blocked on a mutex likely owned by task kworker/0:133:3790. Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:665 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:666 state:D stack:0 pid:4964 tgid:4964 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9ba80 r7:ddde2d40 r6:83018200 r5:854b638c r4:854c5480 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9bc40 INFO: task kworker/1:666:4964 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9ef4d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:4966 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4b5d84 r8:00000002 r7:60000013 r6:eb4b5d8c r5:854e0c00 r4:854e0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9bcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2fd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b678c r4:854b6400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b678c r4:854c5580 Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) Exception stack(0xe05e5d20 to 0xe05e5d68) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:4968 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:854e1800 r4:854e1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a9be40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b6b8c r4:854b6800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b6b8c r4:854c5680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e1800 r8:854c56ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854c5680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5680 r8:8027ed34 r7:eb4b5e60 r6:854c5700 r5:854e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9bc80 INFO: task kworker/1:668:4968 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d60: 800f0013 ffffffff r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:669 state:D stack:0 pid:4971 tgid:4971 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:854b6f8c r4:854b6c00 r4:854c5780 dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:670:4972 blocked for more than 464 seconds. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:854e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b738c r4:854b7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b738c r4:854c5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e3000 r8:854c58ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854c5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5880 r8:8027ed34 r7:eb4bde60 r6:854c5900 r5:854e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a9bf00 INFO: task kworker/1:670:4972 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9fb61000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:672 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9ff35000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:673:4979 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:673 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4d1d84 r8:00000002 r7:60000013 r6:eb4d1d8c r5:854e5400 r4:854e5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84844340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b7b8c r4:854b7800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854b7b8c r4:854c5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e5400 r8:854c5bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854c5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5b80 r8:8027ed34 r7:eb4c9e60 r6:854c5c00 r5:854e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:854e6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84844400 r7:ddde2d40 r6:83018200 r5:854b7f8c r4:854c5c80 Exception stack(0xeb4ddfb0 to 0xeb4ddff8) r4:84844440 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4e5d84 r8:00000002 r7:60000113 r6:eb4e5d8c r5:854e6c00 r4:854e6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84844a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4fb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bcb8c r4:854bc800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bcb8c r4:854c5d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e6c00 r8:854c5dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854c5d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5d80 r8:8027ed34 r7:eb4c9e60 r6:854c5e00 r5:854e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84844580 INFO: task kworker/1:675:4982 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a0362000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:4984 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4f9d84 r8:00000002 r7:60000013 r6:eb4f9d8c r5:854e8c00 r4:854e8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848447c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ed000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bc78c r4:854bc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854e8c00 r8:854c5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84849200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bdf8c r4:854bdc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bdf8c r4:854c5f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ea400 r8:854c5fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:854c5f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c5f80 r8:8027ed34 r7:eb4e5e60 r6:84a82000 r5:854ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84844a00 INFO: task kworker/1:677:4986 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a09b9000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:678:4987 blocked for more than 464 seconds. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:854e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:4990 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4f1d84 r8:00000002 r7:60000113 r6:eb4f1d8c r5:853c6c00 r4:853c6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8484a6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb529000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bd78c r4:854bd400 r7:dddced40 r6:83018000 r5:854bd78c r4:847dfa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c6c00 r8:847dfa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847dfa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dfa00 r8:8027ed34 r7:eb361e60 r6:847dfa80 r5:853c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f1fb0 to 0xeb4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8484a4c0 INFO: task kworker/0:247:4990 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a0d22000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a82180 r8:8027ed34 r7:eb509e60 r6:847dfb00 r5:853c3c00 r4:8477ad40 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84849f80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551c78c r4:8551c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8551c78c r4:847dfb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c4800 r8:847dfbac r7:82804d40 r6:dddced40 r5:dddced60 r4:847dfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dfb80 r8:8027ed34 r7:eb4f1e60 r6:847dfc00 r5:853c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb51dfb0 to 0xeb51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8484a600 INFO: task kworker/0:248:4995 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a1519000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb541d84 r8:00000002 r7:60000113 r6:eb541d8c r5:853c6000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r9:83018205 r8:853c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:249 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853c5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550fe00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb069000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555878c r4:85558400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555878c r4:847dfd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c5400 r8:847dfd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847dfd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dfd00 r8:8027ed34 r7:eb51de60 r6:847dfd80 r5:853c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8484a840 INFO: task kworker/0:249:4998 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a1b8f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:681:5000 blocked for more than 464 seconds. r5:853c1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:848491c0 Call trace: r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r5:800f0013 r4:80239bd0 r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84849880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb57b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bf38c r4:854bf000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bf38c r4:84a82300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853b6c00 r8:84a8232c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82300 r8:8027ed34 r7:eb54de60 r6:847dfe80 r5:853b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84849380 INFO: task kworker/1:682:5002 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a1f6e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:00001000 r4:e00df000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:84a82380 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:684:5007 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:684 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb575d84 r8:00000002 r7:60000113 r6:eb575d8c r5:848f9800 r4:848f9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84849600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb563000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854beb8c r4:854be800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854beb8c r4:84a82400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a82400 Exception stack(0xeb575fb0 to 0xeb575ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:685:5008 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb579d84 r8:00000002 r7:60000113 r6:eb579d8c r5:848fa400 r4:848fa400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fa400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84849680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb569000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bef8c r4:854bec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bef8c r4:84a82480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fa400 r8:84a824ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82480 r8:8027ed34 r7:eb559e60 r6:84302b00 r5:848fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84849740 INFO: task kworker/1:685:5008 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a2674000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829187f4 r9:eb585d84 r8:00000002 r7:60000113 r6:eb585d8c r5:848fb000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84849a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb581000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bf78c r4:854bf400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bf78c r4:84a82500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fb000 r8:84a8252c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82500 r8:8027ed34 r7:eb559e60 r6:84302a00 r5:848fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84849840 INFO: task kworker/1:686:5010 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r4:00000000 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:848fbc00 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84849b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bfb8c r4:854bf800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bfb8c r4:84a82580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fbc00 r8:84a825ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82580 r8:8027ed34 r7:eb585e60 r6:8484f000 r5:848fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84849840 INFO: task kworker/1:687:5011 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a3029000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:688:5014 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:688 state:D stack:0 pid:5014 tgid:5014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3a9d84 r8:00000002 r7:60000013 r6:eb3a9d8c r5:848fd400 r4:848fd400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84849c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd2d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bff8c r4:854bfc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854bff8c r4:84a82600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fd400 r8:84a8262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82600 r8:8027ed34 r7:eb589e60 r6:8484f080 r5:848fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84849a80 INFO: task kworker/1:688:5014 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a3029000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:5016 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3c5d84 r8:00000002 r7:60000013 r6:eb3c5d8c r5:848fc800 r4:848fc800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fc800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84849cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551c38c r4:8551c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551c38c r4:84a82680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fc800 r8:84a826ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82680 r8:8027ed34 r7:eb3a9e60 r6:8484f100 r5:848fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:690 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a82700 r8:8027ed34 r7:eb3c5e60 r6:84a82780 r5:854ec800 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84849e40 INFO: task kworker/1:690:5018 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a33f0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:691:5020 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:691 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:854ebc00 r4:854ebc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ebc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551cb8c r4:8551c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551cb8c r4:84a82800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ebc00 r8:84a8282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82800 r8:8027ed34 r7:eb3bde60 r6:84a82880 r5:854ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848499c0 INFO: task kworker/1:691:5020 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a37e5000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:250 state:D stack:0 pid:5022 tgid:5022 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:854ed400 r4:854ed400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ed400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a85180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841eeb8c r4:841ee800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841eeb8c r4:8484f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ed400 r8:8484f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8484f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484f180 r8:8027ed34 r7:eb549e60 r6:84a82900 r5:854ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a85080 INFO: task kworker/0:250:5022 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:00000000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 INFO: task kworker/0:251:5023 blocked for more than 464 seconds. r5:854eec00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfc80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:692:5027 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:692 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb535d84 r8:00000002 r7:60000013 r6:eb535d8c r5:854ee000 r4:854ee000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ee000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac17000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551cf8c r4:8551cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551cf8c r4:84a82a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ee000 r8:84a82a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82a00 r8:8027ed34 r7:eb3bde60 r6:84a82a80 r5:854ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a84380 INFO: task kworker/1:692:5027 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a3f0d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:5029 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:693 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:848f8c00 r5:848f8c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead27000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551d78c r4:8551d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551d78c r4:84a82b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8c00 r8:84a82b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82b00 r8:8027ed34 r7:eb3bde60 r6:8484f280 r5:848f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a84500 INFO: task kworker/1:693:5029 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a43ec000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:694 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848fec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eadd3000 r7:ddde2d40 r6:83018200 r5:8551db8c r4:84a82b80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a43ec000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:5033 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:854eb000 r4:854eb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854eb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae67000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841ee38c r4:841ee000 r7:dddced40 r6:83018000 r5:841ee38c r4:8484f380 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:695:5035 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:695 state:D stack:0 pid:5035 tgid:5035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:848fe000 r4:848fe000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fe000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551df8c r4:8551dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551df8c r4:84a82c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fe000 r8:84a82cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82c80 r8:8027ed34 r7:eb59de60 r6:84a82d00 r5:848fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a84840 INFO: task kworker/1:695:5035 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 r4:00000000 r5:00001000 r4:e00df000 r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:696:5037 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:696 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5add84 r8:00000002 r7:60000013 r6:eb5add8c r5:853d0c00 r4:853d0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551e38c r4:8551e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551e38c r4:84a82d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d0c00 r8:84a82dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a82d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a82d80 r8:8027ed34 r7:eb56de60 r6:8484f400 r5:853d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5adfb0 to 0xeb5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a84a40 INFO: task kworker/1:696:5037 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a4db1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:697:5039 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:697 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5b1d84 r8:00000002 r7:60000013 r6:eb5b1d8c r5:853d1800 r4:853d1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a82e00 Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829187f4 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:853d2400 r5:853d2400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84ec0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5403000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:699:5043 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:699 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5a9d84 r8:00000002 r7:60000013 r6:eb5a9d8c r5:854f0c00 r4:854f0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854f0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8551ef8c r4:84a82f00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a840c0 INFO: task kworker/1:699:5043 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5403000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:700 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854f2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a86300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551f38c r4:8551f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551f38c r4:84a83000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f2400 r8:84a8302c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83000 r8:8027ed34 r7:eb5a9e60 r6:84a83080 r5:854f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a84740 INFO: task kworker/1:700:5044 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800f0013 r4:80239bd0 r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854f1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:702:5049 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:5049 tgid:5049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5d1d84 r8:00000002 r7:60000013 r6:eb5d1d8c r5:853d3c00 r4:853d3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a864c0 r5:00001000 r4:eb5c7000 r7:ddde2d40 r6:83018200 r5:8551fb8c r4:84a83200 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:703:5051 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:703 state:D stack:0 pid:5051 tgid:5051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5ddd84 r8:00000002 r7:60000013 r6:eb5ddd8c r5:853d3000 r4:853d3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5dde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a86680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551ff8c r4:8551fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551ff8c r4:84a83280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d3000 r8:84a832ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83280 r8:8027ed34 r7:eb5d1e60 r6:8484f600 r5:853d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a86100 INFO: task kworker/1:703:5051 is blocked on a mutex likely owned by task kworker/0:133:3790. Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d4800 r5:853d4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:853d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552438c r4:85524000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552438c r4:84a83380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d4800 r8:84a833ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83380 r8:8027ed34 r7:eb5dde60 r6:8484f680 r5:853d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5edfb0 to 0xeb5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a865c0 INFO: task kworker/1:704:5053 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5f99000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:705:5054 blocked for more than 465 seconds. r5:853d6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8552538c r4:85525000 r4:84a83300 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:706:5056 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:706 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:854f0000 r4:854f0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854f0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a86940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552478c r4:85524400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552478c r4:84a83400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f0000 r8:84a8342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83400 r8:8027ed34 r7:eb5f1e60 r6:84a83480 r5:854f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a86780 INFO: task kworker/1:706:5056 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a68d2000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:5058 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:eb5fdd84 r8:00000002 r7:60000013 r6:eb5fdd8c r5:854f3c00 r5:854f3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:708:5061 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:708 state:D stack:0 pid:5061 tgid:5061 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb609d84 r8:00000002 r7:60000013 r6:eb609d8c r5:854f4800 r4:854f4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854f4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a86b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb605000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85524f8c r4:85524c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85524f8c r4:84a83600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f4800 r8:84a8362c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83600 r8:8027ed34 r7:eb5f1e60 r6:84a83680 r5:854f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a86bc0 INFO: task kworker/1:708:5061 is blocked on a mutex likely owned by task kworker/0:133:3790. Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:709:5063 blocked for more than 465 seconds. r5:854f5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853d5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855064c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552678c r4:85526400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552678c r4:84a83800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d5400 r8:84a8382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83800 r8:8027ed34 r7:eb611e60 r6:8484f780 r5:853d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85506040 INFO: task kworker/1:710:5065 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a6e33000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:5067 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:5067 tgid:5067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb639d84 r8:00000002 r7:60000113 r6:eb639d8c r5:85598000 r4:85598000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85598000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855060c0 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85525b8c r4:85525800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85525b8c r4:84a83880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85598000 r8:84a838ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83880 r8:8027ed34 r7:eb631e60 r6:8484f800 r5:85598000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85506040 INFO: task kworker/1:711:5067 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a6e33000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85598c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a83900 Exception stack(0xeb63dfb0 to 0xeb63dff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:5070 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:713 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb61dd84 r8:00000002 r7:60000013 r6:eb61dd8c r5:854f6000 r4:854f6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854f6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855062c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb647000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552638c r4:85526000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552638c r4:84a83980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f6000 r8:84a839ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83980 r8:8027ed34 r7:eb631e60 r6:84a83a00 r5:854f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855061c0 INFO: task kworker/1:713:5070 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a7671000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:714:5072 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred r4:854f6c00 r5:854f6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:854f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:715:5074 blocked for more than 465 seconds. r5:854f3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855067c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb661000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85526f8c r4:85526c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85526f8c r4:84a83b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f3000 r8:84a83bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83b80 r8:8027ed34 r7:eb645e60 r6:84a83c00 r5:854f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85506400 INFO: task kworker/1:715:5074 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a7d4a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854e8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85506b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb683000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85527b8c r4:85527800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85527b8c r4:84a83c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e8000 r8:84a83cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83c80 r8:8027ed34 r7:eb651e60 r6:84a83d00 r5:854e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85506780 INFO: task kworker/1:716:5077 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a803b000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:717:5078 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:717 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:854f8000 r4:854f8000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854f8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8552738c r4:85527000 r10:00000000 r9:84a83d80 r8:8027ed34 r7:eb659e60 r6:84a83e00 r5:854f8000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:5081 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:854f8c00 r4:854f8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854f8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85506ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb675000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552778c r4:85527400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552778c r4:84a83e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f8c00 r8:84a83eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83e80 r8:8027ed34 r7:eb659e60 r6:84a83f00 r5:854f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85506a40 INFO: task kworker/1:718:5081 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 r5:00001000 r4:e00df000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:719:5082 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:719 state:D stack:0 pid:5082 tgid:5082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb679d84 r8:00000002 r7:60000013 r6:eb679d8c r5:854f9800 r4:854f9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854f9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85506d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb689000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85527f8c r4:85527c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85527f8c r4:855c9000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f9800 r8:855c902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9000 r8:8027ed34 r7:eb659e60 r6:855c9080 r5:854f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05e5d20 to 0xe05e5d68) r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:5084 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb68dd84 r8:00000002 r7:60000113 r6:eb68dd8c r5:854fb000 r4:854fb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854fb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a85440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb693000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553038c r4:85530000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553038c r4:855c9100 r10:00000000 r9:855c9100 r8:8027ed34 r7:eb679e60 r6:855c9180 r5:854fb000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb489d84 r8:00000002 r7:60000013 r6:eb489d8c r5:854fc800 r4:854fc800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854fc800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a84000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa63000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553078c r4:85530400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553078c r4:855c9200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fc800 r8:855c922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9200 r8:8027ed34 r7:eb68de60 r6:855c9280 r5:854fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a85f80 INFO: task kworker/1:721:5087 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8ee3000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:854fd400 r5:854fd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ca200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4857000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85530f8c r4:85530c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85530f8c r4:855c9300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fd400 r8:855c932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9300 r8:8027ed34 r7:eb489e60 r6:855c9380 r5:854fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a85f80 INFO: task kworker/1:722:5089 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a93df000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:723:5091 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:723 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb681d84 r8:00000002 r7:60000013 r6:eb681d8c r5:854fa400 r4:854fa400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854fa400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ca040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e044d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85530b8c r4:85530800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85530b8c r4:855c9400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fa400 r8:855c942c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9400 r8:8027ed34 r7:eb52de60 r6:855c9480 r5:854fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb681fb0 to 0xeb681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ca000 INFO: task kworker/1:723:5091 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a93df000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:5093 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:5093 tgid:5093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6a1d84 r8:00000002 r7:60000113 r6:eb6a1d8c r5:854fec00 r4:854fec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854fec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ca640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553178c r4:85531400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553178c r4:855c9500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fec00 r8:855c952c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9500 r8:8027ed34 r7:eb52de60 r6:855c9580 r5:854fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ca1c0 INFO: task kworker/1:724:5093 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a9725000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:725:5094 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:725 state:D stack:0 pid:5094 tgid:5094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb69dd84 r8:00000002 r7:60000013 r6:eb69dd8c r5:854fe000 r4:854fe000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854fe000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ca4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553138c r4:85531000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553138c r4:855c9600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fe000 r8:855c962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9600 r8:8027ed34 r7:eb6a1e60 r6:855c9680 r5:854fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ca600 INFO: task kworker/1:725:5094 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a9725000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:726:5097 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:726 state:D stack:0 pid:5097 tgid:5097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6a9d84 r8:00000002 r7:60000013 r6:eb6a9d8c r5:84af0000 r4:84af0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550fb40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af0000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb017000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841edf8c r4:841edc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:841edf8c r4:855c9700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af0000 r8:855c972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9700 r8:8027ed34 r7:eb6a1e60 r6:855c9780 r5:84af0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ca580 INFO: task kworker/1:726:5097 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a9848000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:5098 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:5098 tgid:5098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b1d84 r8:00000002 r7:60000013 r6:eb6b1d8c r5:84af1800 r4:84af1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cab00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85531b8c r4:85531800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85531b8c r4:855c9800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af1800 r8:855c982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9800 r8:8027ed34 r7:eb6a9e60 r6:855c9880 r5:84af1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b1fb0 to 0xeb6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ca8c0 INFO: task kworker/1:727:5098 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a9a51000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:5101 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:5101 tgid:5101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:8559b000 r4:8559b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550fc00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559b000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb035000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555838c r4:85558000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555838c r4:8484f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559b000 r8:8484f92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8484f900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484f900 r8:8027ed34 r7:eb549e60 r6:8484f980 r5:8559b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550f800 INFO: task kworker/0:253:5101 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a9f21000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:5103 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b9d84 r8:00000002 r7:60000013 r6:eb6b9d8c r5:8559c800 r4:8559c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cac00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8559c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf05000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85531f8c r4:85531c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85531f8c r4:855c9900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559c800 r8:855c992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9900 r8:8027ed34 r7:eb6a9e60 r6:8484fa00 r5:8559c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855caac0 INFO: task kworker/1:728:5103 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a9f21000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:729:5106 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:729 state:D stack:0 pid:5106 tgid:5106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b5d84 r8:00000002 r7:60000013 r6:eb6b5d8c r5:8559d400 r4:8559d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855caf40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8559d400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb085000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553238c r4:85532000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553238c r4:855c9980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559d400 r8:855c99ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9980 r8:8027ed34 r7:eb6a9e60 r6:8484fa80 r5:8559d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855cacc0 INFO: task kworker/1:729:5106 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aa165000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:5109 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:5109 tgid:5109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6add84 r8:00000002 r7:60000013 r6:eb6add8c r5:8559e000 r4:8559e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fe040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554638c r4:85546000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8554638c r4:8484fb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559e000 r8:8484fb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8484fb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484fb00 r8:8027ed34 r7:eb549e60 r6:8484fb80 r5:8559e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550fd40 INFO: task kworker/0:254:5109 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aa494000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:5111 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6c1d84 r8:00000002 r7:60000013 r6:eb6c1d8c r5:8559ec00 r4:8559ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8559ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb129000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85532b8c r4:85532800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85532b8c r4:855c9a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559ec00 r8:855c9a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9a00 r8:8027ed34 r7:eb6b5e60 r6:8484fc00 r5:8559ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855caf00 INFO: task kworker/1:730:5111 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aa494000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:5112 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:5112 tgid:5112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6c5d84 r8:00000002 r7:60000113 r6:eb6c5d8c r5:8559bc00 r4:8559bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d3400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8559bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb545000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85558b8c r4:85558800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85558b8c r4:8484fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559bc00 r8:8484fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8484fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8484fc80 r8:8027ed34 r7:eb6ade60 r6:8484fd00 r5:8559bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550fec0 INFO: task kworker/0:255:5112 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aa7e7000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:731:5113 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:5113 tgid:5113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6c9d84 r8:00000002 r7:60000113 r6:eb6c9d8c r5:85599800 r4:85599800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85599800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855caf00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85599800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb107000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553278c r4:85532400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553278c r4:855c9a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85599800 r8:855c9aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9a80 r8:8027ed34 r7:eb6c1e60 r6:8484fd80 r5:85599800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855caac0 INFO: task kworker/1:731:5113 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aab03000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:5116 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:5116 tgid:5116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6d1d84 r8:00000002 r7:60000113 r6:eb6d1d8c r5:853d6c00 r4:853d6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb153000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85532f8c r4:85532c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85532f8c r4:855c9b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d6c00 r8:855c9b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9b00 r8:8027ed34 r7:eb6c1e60 r6:8484fe00 r5:853d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d1fb0 to 0xeb6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514080 INFO: task kworker/1:732:5116 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aab03000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:733:5118 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:733 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:855a0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85534b8c r4:85534800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:734:5120 blocked for more than 465 seconds. r4:855a1800 r5:855a1800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:855c9c00 r10:00000000 r9:855c9c00 r8:8027ed34 r7:eb6d9e60 r6:8484ff00 r5:855a1800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ab1bd000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:735:5121 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:735 state:D stack:0 pid:5121 tgid:5121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6e5d84 r8:00000002 r7:60000113 r6:eb6e5d8c r5:855a2400 r4:855a2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855a2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb187000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553378c r4:85533400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553378c r4:855c9c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a2400 r8:855c9cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9c80 r8:8027ed34 r7:eb6d9e60 r6:8484ff80 r5:855a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e5fb0 to 0xeb6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514280 INFO: task kworker/1:735:5121 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ab1bd000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:82ac21e4 r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:00001000 r4:e00df000 r5:84b9738c r4:84b97000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:5123 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:5123 tgid:5123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6edd84 r8:00000002 r7:60000013 r6:eb6edd8c r5:855a0c00 r4:855a0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855a0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85533b8c r4:85533800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85533b8c r4:855c9d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a0c00 r8:855c9d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9d00 r8:8027ed34 r7:eb6d9e60 r6:855d5000 r5:855a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514380 INFO: task kworker/1:736:5123 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ab4f5000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 INFO: task kworker/1:737:5126 blocked for more than 465 seconds. r5:855a3000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f9e08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb6f9fb0 to 0xeb6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514540 INFO: task kworker/1:737:5126 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ab89f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 r5:84b9738c r4:84b97000 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:738:5127 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:738 state:D stack:0 pid:5127 tgid:5127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6bdd84 r8:00000002 r7:60000113 r6:eb6bdd8c r5:84af3c00 r4:84af3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553438c r4:85534000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553438c r4:855c9e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af3c00 r8:855c9e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9e00 r8:8027ed34 r7:eb6d9e60 r6:855c9e80 r5:84af3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:739:5130 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:739 state:D stack:0 pid:5130 tgid:5130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af0c00 r5:84af0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb201000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553478c r4:85534400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553478c r4:855c9f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af0c00 r8:855c9f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855c9f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c9f00 r8:8027ed34 r7:eb6d9e60 r6:855c9f80 r5:84af0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6fdfb0 to 0xeb6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855147c0 INFO: task kworker/1:739:5130 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ac2e4000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:740:5131 blocked for more than 466 seconds. r10:829187f4 r9:eb6cdd84 r8:00000002 r7:60000013 r6:eb6cdd8c r5:84af4800 r5:84af4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85534f8c r4:85534c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85534f8c r4:84a83f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af4800 r8:84a83fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84a83f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a83f80 r8:8027ed34 r7:eb6d9e60 r6:855d7000 r5:84af4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6cdfb0 to 0xeb6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514c00 INFO: task kworker/1:740:5131 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ac2e4000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:741:5134 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:741 state:D stack:0 pid:5134 tgid:5134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb701d84 r8:00000002 r7:60000113 r6:eb701d8c r5:84af5400 r4:84af5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af5400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb297000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553538c r4:85535000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553538c r4:855d7080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af5400 r8:855d70ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7080 r8:8027ed34 r7:eb6cde60 r6:855d7100 r5:84af5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb701fb0 to 0xeb701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514c40 INFO: task kworker/1:741:5134 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ac493000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:5136 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:5136 tgid:5136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb705d84 r8:00000002 r7:60000113 r6:eb705d8c r5:84af6c00 r4:84af6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ca780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb305000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85535b8c r4:85535800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85535b8c r4:855d7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af6c00 r8:855d71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7180 r8:8027ed34 r7:eb701e60 r6:855d7200 r5:84af6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb705fb0 to 0xeb705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514d00 INFO: task kworker/1:742:5136 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aca17000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:743:5137 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:743 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb709d84 r8:00000002 r7:60000113 r6:eb709d8c r5:84af3000 r4:84af3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb709e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553578c r4:85535400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553578c r4:855d7280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af3000 r8:855d72ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7280 r8:8027ed34 r7:eb705e60 r6:855d7300 r5:84af3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb709fb0 to 0xeb709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550f2c0 INFO: task kworker/1:743:5137 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aca17000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:5140 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:5140 tgid:5140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb70dd84 r8:00000002 r7:60000113 r6:eb70dd8c r5:84af2400 r4:84af2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af2400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553738c r4:85537000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553738c r4:855d7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af2400 r8:855d73ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7380 r8:8027ed34 r7:eb705e60 r6:855d7400 r5:84af2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb70dfb0 to 0xeb70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ca880 INFO: task kworker/1:744:5140 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: acb54000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:5142 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:5142 tgid:5142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb711d84 r8:00000002 r7:60000013 r6:eb711d8c r5:84af6000 r4:84af6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478afc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af6000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb333000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85535f8c r4:85535c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85535f8c r4:855d7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af6000 r8:855d74ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7480 r8:8027ed34 r7:eb70de60 r6:855d7500 r5:84af6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb711fb0 to 0xeb711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e5100 INFO: task kworker/1:745:5142 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: acf16000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:746:5143 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:746 state:D stack:0 pid:5143 tgid:5143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb719d84 r8:00000002 r7:60000113 r6:eb719d8c r5:85608000 r4:85608000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85608000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85608000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb347000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553638c r4:85536000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553638c r4:855d7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85608000 r8:855d75ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7580 r8:8027ed34 r7:eb70de60 r6:855d7600 r5:85608000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb719fb0 to 0xeb719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e5180 INFO: task kworker/1:746:5143 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: acf16000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:747:5145 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:747 state:D stack:0 pid:5145 tgid:5145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb71dd84 r8:00000002 r7:60000113 r6:eb71dd8c r5:85608c00 r4:85608c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85608c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85608c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb433000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8553678c r4:85536400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8553678c r4:855d7680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85608c00 r8:855d76ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7680 r8:8027ed34 r7:eb70de60 r6:855d7700 r5:85608c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb71dfb0 to 0xeb71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e5180 INFO: task kworker/1:747:5145 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ad242000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:748:5147 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:748 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb721d84 r8:00000002 r7:60000113 r6:eb721d8c r5:8560a400 r4:8560a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8560a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8560a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb441000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85536b8c r4:85536800 r7:ddde2d40 r6:83018200 r5:85536b8c r4:855d7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560a400 r8:855d77ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7780 r8:8027ed34 r7:eb70de60 r6:855d7800 r5:8560a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e5100 INFO: task kworker/1:748:5147 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ad4dc000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:5149 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:5149 tgid:5149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb725d84 r8:00000002 r7:60000113 r6:eb725d8c r5:85609800 r4:85609800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85609800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85609800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb453000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85536f8c r4:85536c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85536f8c r4:855d7880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85609800 r8:855d78ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7880 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e5140 INFO: task kworker/1:749:5149 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ad712000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:5151 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:5151 tgid:5151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb715d84 r8:00000002 r7:60000013 r6:eb715d8c r5:8560bc00 r4:8560bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8560bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8560bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46f000 r5:8553778c r4:85537400 r4:855d7980 Exception stack(0xeb715fb0 to 0xeb715ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ad9e6000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:5154 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:751 state:D stack:0 pid:5154 tgid:5154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb729d84 r8:00000002 r7:60000013 r6:eb729d8c r5:8560c800 r4:8560c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8560c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8560c800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb479000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85537b8c r4:85537800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85537b8c r4:855d7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560c800 r8:855d7aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7a80 r8:8027ed34 r7:eb715e60 r6:855d7b00 r5:8560c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb729fb0 to 0xeb729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e5a80 INFO: task kworker/1:751:5154 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ad9e6000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:5156 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5156 tgid:5156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb731d84 r8:00000002 r7:60000113 r6:eb731d8c r5:8560d400 r4:8560d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8560d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8560d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb497000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85537f8c r4:85537c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85537f8c r4:855d7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560d400 r8:855d7bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7b80 r8:8027ed34 r7:eb729e60 r6:855d7c00 r5:8560d400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: adfe6000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5158 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r5:8560e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb735fb0 to 0xeb735ff8) Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:5160 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:8560ec00 r4:8560ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8560ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8560ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554438c r4:85544000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554438c r4:855d7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560ec00 r8:855d7dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7d80 r8:8027ed34 r7:eb735e60 r6:855d7e00 r5:8560ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb72dfb0 to 0xeb72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e5cc0 INFO: task kworker/1:754:5160 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ae0b7000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8560b000 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:855d7e80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5164 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb741d84 r8:00000002 r7:60000113 r6:eb741d8c r5:854fbc00 r4:854fbc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854fbc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ef380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4fd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85544f8c r4:85544c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85544f8c r4:855d7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fbc00 r8:855d7fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d7f80 r8:8027ed34 r7:eb739e60 r6:855f5000 r5:854fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb741fb0 to 0xeb741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ef100 INFO: task kworker/1:756:5164 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ae7be000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:5167 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:5167 tgid:5167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb745d84 r8:00000002 r7:60000113 r6:eb745d8c r5:85610000 r4:85610000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85610000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ef640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85610000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554578c r4:85545400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554578c r4:855f5080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610000 r8:855f50ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5080 r8:8027ed34 r7:eb741e60 r6:855f5100 r5:85610000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ef340 INFO: task kworker/1:757:5167 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ae91a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:758 state:D stack:0 pid:5168 tgid:5168 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85610c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ef480 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8554538c r4:855f5180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610c00 r8:855f51ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5180 r8:8027ed34 r7:eb745e60 r6:855f5200 r5:85610c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ef340 INFO: task kworker/1:758:5168 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aeae5000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5170 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb74dd84 r8:00000002 r7:60000113 r6:eb74dd8c r5:85611800 r4:85611800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85611800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ef700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85611800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb527000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85545b8c r4:85545800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85545b8c r4:855f5280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85611800 r8:855f52ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5280 r8:8027ed34 r7:eb745e60 r6:855f5300 r5:85611800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb74dfb0 to 0xeb74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r5:85612400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: aee63000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5174 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855a6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:855ef740 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:855a6000 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fe200 r4:855f5500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5500 r8:8027ed34 r7:eb759e60 r6:855d5180 r5:855a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb75dfb0 to 0xeb75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ef740 INFO: task kworker/1:762:5175 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: af3e4000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:5178 blocked for more than 466 seconds. r5:855a5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:84bdfc80 INFO: task kworker/0:257:5181 blocked for more than 466 seconds. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb633000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85559f8c r4:85559c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85559f8c r4:855d5300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a3c00 r8:855d532c r7:82804d40 r6:dddced40 r5:dddced60 r4:855d5300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d5300 r8:8027ed34 r7:eb73de60 r6:855d5380 r5:855a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fe280 INFO: task kworker/0:257:5181 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: af993000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:855a4800 r4:829187f0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855a4800 r8:855f55ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5580 r8:8027ed34 r7:eb759e60 r6:855d5400 r5:855a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855efd80 INFO: task kworker/1:763:5182 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: afa4f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r5:853d0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb76dfb0 to 0xeb76dff8) [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85546b8c r4:855f5600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85618000 r8:855f562c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5600 r8:8027ed34 r7:eb755e60 r6:855d5580 r5:85618000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855efe00 INFO: task kworker/1:764:5185 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: afcd6000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:765:5188 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:765 state:D stack:0 pid:5188 tgid:5188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5f5d84 r8:00000002 r7:60000013 r6:eb5f5d8c r5:85618c00 r5:85618c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855efc00 r7:ddde2d40 r6:83018200 r5:85546f8c r4:855f5680 5fa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:766:5189 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb621d84 r8:00000002 r7:60000113 r6:eb621d8c r5:8561a400 r4:8561a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8561a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561a400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85547f8c r4:85547c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85547f8c r4:855f5700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561a400 r8:855f572c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5700 r8:8027ed34 r7:eb755e60 r6:855d5680 r5:8561a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb040 INFO: task kworker/1:766:5189 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r4:00000000 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85619800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb655fb0 to 0xeb655ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5193 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5193 tgid:5193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb781d84 r8:00000002 r7:60000013 r6:eb781d8c r5:8561b000 r4:8561b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8561b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85547b8c r4:85547800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85547b8c r4:855f5800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561b000 r8:855f582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5800 r8:8027ed34 r7:eb621e60 r6:855d5780 r5:8561b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb440 INFO: task kworker/1:768:5193 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b03cd000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:769:5195 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:769 state:D stack:0 pid:5195 tgid:5195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb789d84 r8:00000002 r7:60000013 r6:eb789d8c r5:8561bc00 r4:8561bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8561bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac23000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554838c r4:85548000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554838c r4:855f5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561bc00 r8:855f58ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5880 r8:8027ed34 r7:eb621e60 r6:855d5800 r5:8561bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb500 INFO: task kworker/1:769:5195 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b08bf000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b9738c r4:84b97000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:770:5198 blocked for more than 466 seconds. [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8561e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85548b8c r4:85548800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85548b8c r4:855f5900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561e000 r8:855f592c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5900 r8:8027ed34 r7:eb789e60 r6:855d5880 r5:8561e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb791fb0 to 0xeb791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb580 INFO: task kworker/1:770:5198 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b08bf000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf4c0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8561ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855f5980 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:771:5200 is blocked on a mutex likely owned by task kworker/0:133:3790. [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 r5:00001000 r4:e00df000 r5:84b9738c r4:84b97000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5201 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5201 tgid:5201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb799d84 r8:00000002 r7:60000013 r6:eb799d8c r5:8561d400 r4:8561d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8561d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaff3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554938c r4:85549000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554938c r4:855f5a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561d400 r8:855f5a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5a00 r8:8027ed34 r7:eb791e60 r6:855d5980 r5:8561d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb799fb0 to 0xeb799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb840 INFO: task kworker/1:772:5201 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b0e0b000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5203 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb771d84 r8:00000002 r7:60000113 r6:eb771d8c r5:85616000 r4:85616000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85616000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb771e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fba80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85616000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf85000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85548f8c r4:85548c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85548f8c r4:855f5a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85616000 r8:855f5aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5a80 r8:8027ed34 r7:eb799e60 r6:855f5b00 r5:85616000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb771fb0 to 0xeb771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb840 INFO: task kworker/1:773:5203 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b0e0b000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:774:5206 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:774 state:D stack:0 pid:5206 tgid:5206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb79dd84 r8:00000002 r7:60000013 r6:eb79dd8c r5:85616c00 r5:85616c00 r4:829187f0 r4:00000000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85616c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554978c r4:85549400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554978c r4:855f5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85616c00 r8:855f5bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5b80 r8:8027ed34 r7:eb799e60 r6:855f5c00 r5:85616c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb840 INFO: task kworker/1:774:5206 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:775:5209 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85615400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:855fbe40 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r5:00001000 r4:e00df000 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:776:5211 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:776 state:D stack:0 pid:5211 tgid:5211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7a5d84 r8:00000002 r7:60000113 r6:eb7a5d8c r5:85614800 r4:85614800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85614800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85614800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554ab8c r4:8554a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554ab8c r4:855f5d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85614800 r8:855f5dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5d80 r8:8027ed34 r7:eb7a1e60 r6:855f5e00 r5:85614800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85613c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85549f8c r4:85549c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85549f8c r4:855f5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613c00 r8:855f5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f5e80 r8:8027ed34 r7:eb7a5e60 r6:855f5f00 r5:85613c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb785fb0 to 0xeb785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b60c0 INFO: task kworker/1:777:5212 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b18c3000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 INFO: task kworker/1:778:5216 blocked for more than 467 seconds. r4:8559a400 r5:8559a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb5d7000 r7:ddde2d40 r6:83018200 r5:8554a38c r4:855f5f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r4:00000000 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:5218 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:5218 tgid:5218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7b5d84 r8:00000002 r7:60000013 r6:eb7b5d8c r5:843a8c00 r4:843a8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843a8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554a78c r4:8554a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554a78c r4:84b0b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a8c00 r8:84b0b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b000 r8:8027ed34 r7:eb7a5e60 r6:855d5a80 r5:843a8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b6500 INFO: task kworker/1:779:5218 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b219e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:843a9800 r5:843a9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Exception stack(0xeb7b9fb0 to 0xeb7b9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5222 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5222 tgid:5222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:843aa400 r4:843aa400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843aa400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb615000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554b38c r4:8554b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554b38c r4:84b0b100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843aa400 r8:84b0b12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b100 r8:8027ed34 r7:eb7b9e60 r6:855d5b80 r5:843aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b6780 INFO: task kworker/1:781:5222 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:843ab000 r5:843ab000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb685000 r5:8555038c r4:85550000 r10:61c88647 r9:843ab000 r8:84b0b1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b29ce000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:783:5226 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:783 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7add84 r8:00000002 r7:60000113 r6:eb7add8c r5:85622400 r4:85622400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85622400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85622400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb625000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554b78c r4:8554b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b0b200 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 task:kworker/0:259 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85620000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a8940 r7:dddced40 r6:83018000 r5:8555b38c r4:855d5c80 r4:00000001 Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) r4:856051c0 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:784:5229 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:5229 tgid:5229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7c9d84 r8:00000002 r7:60000013 r6:eb7c9d8c r5:85623c00 r4:85623c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85623c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85623c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554bb8c r4:8554b800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554bb8c r4:84b0b380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85623c00 r8:84b0b3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b380 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf4c0 INFO: task kworker/1:785:5231 blocked for more than 467 seconds. r4:843abc00 r5:843abc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b6f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb673000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8554bf8c r4:8554bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8554bf8c r4:84b0b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843abc00 r8:84b0b42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b400 r8:8027ed34 r7:eb7c1e60 r6:855d5d80 r5:843abc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b6c40 INFO: task kworker/1:785:5231 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b3039000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:5232 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:5232 tgid:5232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7cdd84 r8:00000002 r7:60000113 r6:eb7cdd8c r5:843ac800 r4:843ac800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843ac800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85605500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb667000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555a38c r4:8555a000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555a38c r4:855d5e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ac800 r8:855d5e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855d5e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d5e00 r8:8027ed34 r7:eb7c5e60 r6:855d5e80 r5:843ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7cdfb0 to 0xeb7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85605300 INFO: task kworker/0:260:5232 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b32db000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:786:5236 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:786 state:D stack:0 pid:5236 tgid:5236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7d9d84 r8:00000002 r7:60000113 r6:eb7d9d8c r5:843aec00 r4:843aec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843aec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0d000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:e05e5dc0 r4:00000000 r5:00001000 r4:e00df000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:787:5237 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:787 state:D stack:0 pid:5237 tgid:5237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7ddd84 r8:00000002 r7:60000113 r6:eb7ddd8c r5:843ad400 r4:843ad400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843ad400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb691000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555078c r4:85550400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555078c r4:84b0b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ad400 r8:84b0b52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b500 r8:8027ed34 r7:eb7d9e60 r6:855d5f80 r5:843ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb500 INFO: task kworker/1:787:5237 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b35e2000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7f1d84 r8:00000002 r7:60000113 r6:eb7f1d8c r5:843ae000 r4:843ae000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843ae000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0d3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb805000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555178c r4:85551400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555178c r4:84b0b580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843ae000 r8:84b0b5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b580 r8:8027ed34 r7:eb7d9e60 r6:84b08000 r5:843ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0d0c0 INFO: task kworker/1:788:5240 is blocked on a mutex likely owned by task kworker/0:133:3790. Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:84b9738c r4:84b97000 r4:00000001 r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:843a8000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0d0c0 INFO: task kworker/1:789:5241 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b397c000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5244 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb80dd84 r8:00000002 r7:60000013 r6:eb80dd8c r5:855a9800 r4:855a9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855a9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0d280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ff000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555138c r4:85551000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555138c r4:84b0b680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a9800 r8:84b0b6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b680 r8:8027ed34 r7:eb7f1e60 r6:84b08100 r5:855a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0d180 INFO: task kworker/1:790:5244 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855a8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b0d2c0 Call trace: Exception stack(0xe05e5d20 to 0xe05e5d68) r5:800f0013 r4:80239bd0 r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:855a8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0d8c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555278c r4:85552400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555278c r4:84b0b780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a8c00 r8:84b0b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b780 r8:8027ed34 r7:eb821e60 r6:84b08200 r5:855a8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb829fb0 to 0xeb829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0d400 INFO: task kworker/1:792:5248 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b3e7a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:793 state:D stack:0 pid:5249 tgid:5249 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855aa400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb831e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85551f8c r4:85551c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85551f8c r4:84b0b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aa400 r8:84b0b82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b800 r8:8027ed34 r7:eb829e60 r6:84b08280 r5:855aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb831fb0 to 0xeb831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0d500 INFO: task kworker/1:793:5249 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b413d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:855ab000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855ab000 r8:84b0b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b880 r8:8027ed34 r7:eb829e60 r6:84b08300 r5:855ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb841fb0 to 0xeb841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0d6c0 INFO: task kworker/1:794:5251 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b46f0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:84b9738c r4:84b97000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:855ad400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:84b0b900 dfa0: 00000000 00000000 00000000 00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r4:00000000 r5:84b9738c r4:84b97000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:855ae000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855ae000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb85de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0da00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb853000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85552b8c r4:85552800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85552b8c r4:84b0b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ae000 r8:84b0b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0b980 r8:8027ed34 r7:eb84de60 r6:84b08400 r5:855ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb85dfb0 to 0xeb85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0d900 INFO: task kworker/1:796:5255 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b48a9000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5257 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5257 tgid:5257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb869d84 r8:00000002 r7:60000113 r6:eb869d8c r5:855abc00 r4:855abc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855abc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0db80 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85552f8c r4:85552c00 r7:ddde2d40 r6:83018200 r5:85552f8c r4:84b0ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:5258 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:5258 tgid:5258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb86dd84 r8:00000002 r7:60000113 r6:eb86dd8c r5:855aec00 r4:855aec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855aec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c100 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb873000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555a78c r4:8555a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555a78c r4:84b08500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aec00 r8:84b0852c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b08500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b08500 r8:8027ed34 r7:eb7c5e60 r6:84b08580 r5:855aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856058c0 INFO: task kworker/0:261:5258 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b4a4d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:e00df000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5260 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5260 tgid:5260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb871d84 r8:00000002 r7:60000113 r6:eb871d8c r5:855ac800 r4:855ac800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855ac800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb871e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0de00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb879000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555338c r4:85553000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555338c r4:84b0ba80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ac800 r8:84b0baac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0ba80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0ba80 r8:8027ed34 r7:eb84de60 r6:84b08600 r5:855ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0db00 INFO: task kworker/1:798:5260 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b4d6f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5263 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5263 tgid:5263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:8561c800 r4:8561c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8561c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0df00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555378c r4:85553400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8555378c r4:84b0bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561c800 r8:84b0bb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0bb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0bb00 r8:8027ed34 r7:eb84de60 r6:84b08680 r5:8561c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0db00 INFO: task kworker/1:799:5263 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:800:5266 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:800 state:D stack:0 pid:5266 tgid:5266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:855b1800 r4:855b1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aff300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a1000 r5:8565c38c r4:8565c000 r10:61c88647 r9:855b1800 r8:84b0bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0bb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0bb80 r8:8027ed34 r7:eb84de60 r6:84b08700 r5:855b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aff000 INFO: task kworker/1:800:5266 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b54c0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:801:5267 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:801 state:D stack:0 pid:5267 tgid:5267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb899d84 r8:00000002 r7:60000113 r6:eb899d8c r5:855b2400 r4:855b2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb899e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aff200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85553f8c r4:85553c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85553f8c r4:84b0bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:84b0bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0bc00 r8:8027ed34 r7:eb895e60 r6:84b08780 r5:855b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb899fb0 to 0xeb899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aff000 INFO: task kworker/1:801:5267 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b54c0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:802:5270 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:802 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8b1d84 r8:00000002 r7:60000113 r6:eb8b1d8c r5:855b0c00 r4:855b0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84affcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565e38c r4:8565e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565e38c r4:84b0bc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0c00 r8:84b0bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0bc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0bc80 r8:8027ed34 r7:eb895e60 r6:84b08800 r5:855b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b1fb0 to 0xeb8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aff1c0 INFO: task kworker/1:802:5270 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b5b34000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:803:5272 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5272 tgid:5272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8c1d84 r8:00000002 r7:60000113 r6:eb8c1d8c r5:855b4800 r4:855b4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aff480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565c78c r4:8565c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05e5d20 to 0xe05e5d68) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:804:5274 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:804 state:D stack:0 pid:5274 tgid:5274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8cdd84 r8:00000002 r7:60000013 r6:eb8cdd8c r5:855b3000 r4:855b3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aff580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565cb8c r4:8565c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565cb8c r4:84b0bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3000 r8:84b0bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0bd80 r8:8027ed34 r7:eb8b1e60 r6:84b08900 r5:855b3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aff3c0 INFO: task kworker/1:804:5274 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b5f7d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:805:5275 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:805 state:D stack:0 pid:5275 tgid:5275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8d9d84 r8:00000002 r7:60000113 r6:eb8d9d8c r5:855b3c00 r4:855b3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r9:83018205 r8:855b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565cf8c r4:8565cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565cf8c r4:84b0be00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3c00 r8:84b0be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0be00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0be00 r8:8027ed34 r7:eb8b1e60 r6:84b08980 r5:855b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aff540 INFO: task kworker/1:805:5275 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b6396000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d60: 800f0013 ffffffff r4:e05e5dc0 r4:00000000 r5:84b9738c r4:84b97000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:806:5278 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:806 state:D stack:0 pid:5278 tgid:5278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:855b0000 r5:855b0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855b0000 r8:84b0beac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b6396000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855b5400 r5:855b5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb8e9fb0 to 0xeb8e9ff8) r4:00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855b8c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84affa80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565db8c r4:8565d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565db8c r4:84b0bf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b8c00 r8:84b0bfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0bf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0bf80 r8:8027ed34 r7:eb8b1e60 r6:84b08b00 r5:855b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aff680 INFO: task kworker/1:808:5282 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b6b71000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:809:5283 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred r4:85624800 r5:85624800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb861e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84affc00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85624800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa91000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565df8c r4:8565dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565df8c r4:8564d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85624800 r8:8564d02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564d000 r8:8027ed34 r7:eb8b1e60 r6:8564d080 r5:85624800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84aff9c0 INFO: task kworker/1:809:5283 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b6e2e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:810 state:D stack:0 pid:5286 tgid:5286 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85625400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:eaeed000 r10:61c88647 r9:85625400 r8:8564d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb8edfb0 to 0xeb8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84affd00 INFO: task kworker/1:810:5286 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b725c000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 r4:85626000 r5:85626000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 r7:ddde2d40 r6:83018200 r5:8565e78c r4:8564d200 r4:84affd00 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85626c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f9e08 r7:ddde2d40 r6:83018200 r5:8565f38c r4:8564d300 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b0dfc0 INFO: task kworker/1:812:5290 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b7544000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:813:5292 blocked for more than 468 seconds. r4:85621800 r5:85621800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85621800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:8565ef8c r4:8565ec00 r7:ddde2d40 r6:83018200 r5:8565ef8c r4:8564d400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r5:800f0013 r4:80239bd0 r4:e05e5dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:814:5294 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:814 state:D stack:0 pid:5294 tgid:5294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb905d84 r8:00000002 r7:60000113 r6:eb905d8c r5:85623000 r4:85623000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85623000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856550c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85623000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565f78c r4:8565f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565f78c r4:8564d500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85623000 r8:8564d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564d500 r8:8027ed34 r7:eb8f9e60 r6:8564d580 r5:85623000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb905fb0 to 0xeb905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85655280 INFO: task kworker/1:814:5294 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b7b0e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:5296 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:5296 tgid:5296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb909d84 r8:00000002 r7:60000113 r6:eb909d8c r5:85620c00 r4:85620c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85620c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85655340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85620c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565fb8c r4:8565f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565fb8c r4:8564d600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85620c00 r8:8564d62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564d600 r8:8027ed34 r7:eb905e60 r6:8564d680 r5:85620c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb909fb0 to 0xeb909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85655100 INFO: task kworker/1:815:5296 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b7f3d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b9738c r4:84b97000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:816:5297 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:816 state:D stack:0 pid:5297 tgid:5297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8fdd84 r8:00000002 r7:60000113 r6:eb8fdd8c r5:85613000 r4:85613000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85613000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85655540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb141000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565ff8c r4:8565fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565ff8c r4:8564d700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613000 r8:8564d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564d700 r8:8027ed34 r7:eb909e60 r6:8564d780 r5:85613000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85655480 INFO: task kworker/1:816:5297 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b838f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:5299 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:85628000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85655640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85628000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb173000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566838c r4:85668000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566838c r4:8564d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628000 r8:8564d82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564d800 r8:8027ed34 r7:eb8fde60 r6:8564d880 r5:85628000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb90dfb0 to 0xeb90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85655300 INFO: task kworker/1:817:5299 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b8707000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85628c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85655ac0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85668f8c r4:8564d900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628c00 r8:8564d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564d900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564d900 r8:8027ed34 r7:eb90de60 r6:8564d980 r5:85628c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb911fb0 to 0xeb911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856555c0 INFO: task kworker/1:818:5302 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b8b4d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85629800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8564da00 r8:8027ed34 r7:eb911e60 r6:8564da80 r5:85629800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85655700 INFO: task kworker/1:819:5304 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b8ea2000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:820:5306 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:820 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb91dd84 r8:00000002 r7:60000113 r6:eb91dd8c r5:8562a400 r4:8562a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8562a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85655940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562a400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85668b8c r4:85668800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85668b8c r4:8564db00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562a400 r8:8564db2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564db00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564db00 r8:8027ed34 r7:eb911e60 r6:8564db80 r5:8562a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb91dfb0 to 0xeb91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85655a80 INFO: task kworker/1:820:5306 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b8ea2000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:5308 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:5308 tgid:5308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb921d84 r8:00000002 r7:60000013 r6:eb921d8c r5:8562b000 r4:8562b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8562b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a9040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2fb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85669b8c r4:85669800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85669b8c r4:8564dc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562b000 r8:8564dc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564dc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564dc00 r8:8027ed34 r7:eb911e60 r6:8564dc80 r5:8562b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb921fb0 to 0xeb921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85655a00 INFO: task kworker/1:821:5308 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b93e5000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84bbf4c0 task:kworker/1:822 state:D stack:0 pid:5309 tgid:5309 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8562bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8564dd00 Exception stack(0xeb915fb0 to 0xeb915ff8) r4:85655a00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b93e5000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:823:5311 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:823 state:D stack:0 pid:5311 tgid:5311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb925d84 r8:00000002 r7:60000113 r6:eb925d8c r5:8562c800 r4:8562c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8562c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85655d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb269000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566978c r4:85669400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566978c r4:8564de00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562c800 r8:8564de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564de00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564de00 r8:8027ed34 r7:eb921e60 r6:8564de80 r5:8562c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb925fb0 to 0xeb925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85655f00 INFO: task kworker/1:823:5311 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b97cb000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:5314 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:5314 tgid:5314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb92dd84 r8:00000002 r7:60000113 r6:eb92dd8c r5:8562d400 r4:8562d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8562d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a91c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8562d400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb327000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85669f8c r4:85669c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85669f8c r4:8564df00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562d400 r8:8564df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8564df00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8564df00 r8:8027ed34 r7:eb921e60 r6:8564df80 r5:8562d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a9000 INFO: task kworker/1:824:5314 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: b9e62000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:5316 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:5316 tgid:5316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb935d84 r8:00000002 r7:60000113 r6:eb935d8c r5:855b9800 r4:855b9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a94c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566a78c r4:8566a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566a78c r4:856a4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b9800 r8:856a402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4000 r8:8027ed34 r7:eb92de60 r6:84b08b80 r5:855b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb935fb0 to 0xeb935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a9180 INFO: task kworker/1:825:5316 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ba31d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:5317 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb939d84 r8:00000002 r7:60000113 r6:eb939d8c r5:855b8000 r4:855b8000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb939e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a93c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb427000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566a38c r4:8566a000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566a38c r4:856a4080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b8000 r8:856a40ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4080 r8:8027ed34 r7:eb935e60 r6:84b08c00 r5:855b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb939fb0 to 0xeb939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a9180 INFO: task kworker/1:826:5317 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ba31d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:855bbc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566ab8c r4:856a4100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bbc00 r8:856a412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4100 r8:8027ed34 r7:eb935e60 r6:84b08c80 r5:855bbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a9440 INFO: task kworker/1:827:5321 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ba953000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:828:5323 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:828 state:D stack:0 pid:5323 tgid:5323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb949d84 r8:00000002 r7:60000013 r6:eb949d8c r5:855bd400 r4:855bd400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855bd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb949e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a9d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb515000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566c38c r4:8566c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566c38c r4:856a4180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bd400 r8:856a41ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4180 r8:8027ed34 r7:eb945e60 r6:84b08d00 r5:855bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb949fb0 to 0xeb949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a9540 INFO: task kworker/1:828:5323 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bab1a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:5324 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:5324 tgid:5324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb94dd84 r8:00000002 r7:60000013 r6:eb94dd8c r5:855be000 r4:855be000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855be000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb94de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a9780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855be000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb469000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566af8c r4:8566ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566af8c r4:856a4200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855be000 r8:856a422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4200 r8:8027ed34 r7:eb949e60 r6:84b08d80 r5:855be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb94dfb0 to 0xeb94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a9540 INFO: task kworker/1:829:5324 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bab1a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:830:5325 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:830 state:D stack:0 pid:5325 tgid:5325 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855bec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a9900 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:856a9700 INFO: task kworker/1:830:5325 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bae5c000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:855bc800 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fa0: 00000000 00000000 00000000 00000000 r5:800f0013 r4:80239bd0 r4:00000000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5329 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb95dd84 r8:00000002 r7:60000013 r6:eb95dd8c r5:855ba400 r4:855ba400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855ba400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a9b00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5d20 to 0xe05e5d68) r4:e05e5dc0 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:855bb000 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:5334 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:5334 tgid:5334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb96dd84 r8:00000002 r7:60000013 r6:eb96dd8c r5:855b6c00 r4:855b6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855b6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563c780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566cb8c r4:8566c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566cb8c r4:856a4480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b6c00 r8:856a44ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4480 r8:8027ed34 r7:eb949e60 r6:856ba000 r5:855b6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a9d00 INFO: task kworker/1:834:5334 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bbc1d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r5:800f0013 r4:80239bd0 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84bbf4c0 Call trace: r5:8562ec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb961e08 r5:8566c78c r4:8566c400 Exception stack(0xeb961fb0 to 0xeb961ff8) Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/1:836:5338 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:5338 tgid:5338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb929d84 r8:00000002 r7:60000013 r6:eb929d8c r5:85631800 r4:85631800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85631800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b6500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85631800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566d38c r4:8566d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566d38c r4:856a4600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85631800 r8:856a462c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4600 r8:8027ed34 r7:eb96de60 r6:856a4680 r5:85631800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:856a9fc0 5d20: bbfbb000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05e5fb0 to 0xe05e5ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85632400 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566cf8c r4:8566cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566cf8c r4:856a4700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85632400 r8:856a472c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4700 r8:8027ed34 r7:eb929e60 r6:856a4780 r5:85632400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb975fb0 to 0xeb975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856b6000 INFO: task kworker/1:837:5340 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bbfbb000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb93dd84 r8:00000002 r7:60000113 r6:eb93dd8c r5:855b6000 r5:855b6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a8fc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb56f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555af8c r4:8555ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555af8c r4:856ba080 r4:856ba080 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r4:00000000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r5:844d0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8566db8c r4:8566d800 r10:00000000 r9:856a4800 r8:8027ed34 r7:eb929e60 r6:856ba180 r5:844d0000 Exception stack(0xeb971fb0 to 0xeb971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856b6300 INFO: task kworker/1:838:5344 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bc708000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85630000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:ddde2d40 r6:83018200 r5:8566df8c r4:856a4880 dfa0: 00000000 00000000 00000000 00000000 r4:82ac21e4 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:844d0c00 r4:829187f0 r4:00000000 r9:83018005 r8:844d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 r10:61c88647 r9:844d0c00 r8:856ba22c r7:82804d40 r6:dddced40 r5:dddced60 r4:856a8bc0 INFO: task kworker/0:263:5347 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bcc96000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:844d1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8555b78c r4:8555b400 r10:61c88647 r9:844d1800 r8:856ba32c r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a8900 INFO: task kworker/0:264:5349 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bd096000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb989d84 r8:00000002 r7:60000113 r6:eb989d8c r5:844d2400 r5:844d2400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:844d2400 r8:856ba42c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84bbf4c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:5353 tgid:5353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb991d84 r8:00000002 r7:60000113 r6:eb991d8c r5:844d3000 r4:844d3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ae040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb993000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555bb8c r4:8555b800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8555bb8c r4:856ba500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Workqueue: events bpf_prog_free_deferred r5:844d3c00 r4:829187f0 r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb999000 r5:8555bf8c r4:8555bc00 r10:61c88647 r9:844d3c00 r8:856ba62c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:856ae180 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:5357 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:5357 tgid:5357 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:844d4800 r4:844d4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ae7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea985000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558078c r4:85580400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8558078c r4:856ba700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d4800 r8:856ba72c r7:82804d40 r6:dddced40 r5:dddced60 r4:856ba700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b9738c r4:84b97000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:5367 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9b1d84 r8:00000002 r7:60000113 r6:eb9b1d8c r5:844d5400 r4:844d5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ae5c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa55000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841eff8c r4:841efc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841eff8c r4:856ba800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d5400 r8:856ba82c r7:82804d40 r6:dddced40 r5:dddced60 r4:856ba800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ba800 r8:8027ed34 r7:eb9a5e60 r6:856ba880 r5:844d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b1fb0 to 0xeb9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856aeb40 INFO: task kworker/0:269:5367 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:270 state:D stack:0 pid:5368 tgid:5368 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:844d6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ae6c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0599000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558038c r4:85580000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8558038c r4:856ba900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d6000 r8:856ba92c r7:82804d40 r6:dddced40 r5:dddced60 r4:856ba900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ba900 r8:8027ed34 r7:eb9a5e60 r6:856ba980 r5:844d6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856aeb40 INFO: task kworker/0:270:5368 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:844d6c00 r4:00000000 r4:00000000 r5:85580b8c r4:85580800 r10:00000000 r9:856baa00 r8:8027ed34 r7:eb9a5e60 r6:856baa80 r5:844d6c00 Exception stack(0xeb8a5fb0 to 0xeb8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856aeb40 INFO: task kworker/0:271:5369 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bf81a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:5370 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8a9d84 r8:00000002 r7:60000113 r6:eb8a9d8c r5:84958000 r4:84958000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84958000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ae9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84958000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85580f8c r4:85580c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85580f8c r4:856bab00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84958000 r8:856bab2c r7:82804d40 r6:dddced40 r5:dddced60 r4:856bab00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856aeb40 INFO: task kworker/0:272:5370 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: bfff5000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:84958c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856aeac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84958c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8558138c r4:856bac00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:856aeb40 r4:00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c0a35000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:274 state:D stack:0 pid:5372 tgid:5372 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84959800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85659880 r7:dddced40 r6:83018000 r5:85581f8c r4:856bad00 r4:856bad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bad00 r8:8027ed34 r7:eb9b9e60 r6:856bad80 r5:84959800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790480 INFO: task kworker/0:274:5372 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c0c98000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:275:5373 blocked for more than 469 seconds. r5:8495a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eaf73000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495a400 r8:856bae2c r7:82804d40 r6:dddced40 r5:dddced60 r4:856bae00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bae00 r8:8027ed34 r7:eb9bde60 r6:856bae80 r5:8495a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c1fb0 to 0xeb9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a8100 INFO: task kworker/0:275:5373 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c0f6f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:840:5374 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:840 state:D stack:0 pid:5374 tgid:5374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9c5d84 r8:00000002 r7:60000013 r6:eb9c5d8c r5:8495b000 r4:8495b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b6dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8495b000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:5378 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:841 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9d1d84 r8:00000002 r7:60000113 r6:eb9d1d8c r5:8495d400 r4:8495d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b6c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8495d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566e38c r4:8566e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566e38c r4:856a4a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:842:5379 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:842 state:D stack:0 pid:5379 tgid:5379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9d5d84 r8:00000002 r7:60000013 r6:eb9d5d8c r5:8495bc00 r4:8495bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564f000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8495bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566eb8c r4:8566e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566eb8c r4:856a4a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495bc00 r8:856a4aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4a80 r8:8027ed34 r7:eb9c5e60 r6:8569b000 r5:8495bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d5fb0 to 0xeb9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856b6a00 INFO: task kworker/1:842:5379 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c1512000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:843:5381 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:843 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9ddd84 r8:00000002 r7:60000013 r6:eb9ddd8c r5:8495c800 r4:8495c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fa00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8495c800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb671000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566ff8c r4:8566fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566ff8c r4:856a4b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495c800 r8:856a4b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4b00 r8:8027ed34 r7:eb9d5e60 r6:8569b080 r5:8495c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856b6a00 INFO: task kworker/1:843:5381 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c1512000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8495e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8566ef8c r4:856a4b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495e000 r8:856a4bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4b80 r8:8027ed34 r7:eb9dde60 r6:8569b100 r5:8495e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e5fb0 to 0xeb9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564f1c0 INFO: task kworker/1:844:5383 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c1830000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 INFO: task kworker/1:845:5385 blocked for more than 469 seconds. r4:85630c00 r5:85630c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564f600 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85630c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb635000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566f38c r4:8566f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566f38c r4:856a4c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85630c00 r8:856a4c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4c00 r8:8027ed34 r7:eb9dde60 r6:856a4c80 r5:85630c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb88dfb0 to 0xeb88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564f100 INFO: task kworker/1:845:5385 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c1b1c000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:85633c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb60b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85581b8c r4:85581800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85581b8c r4:8569b180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85633c00 r8:8569b1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569b180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569b180 r8:8027ed34 r7:eb9bde60 r6:856a4d00 r5:85633c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c9fb0 to 0xeb9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85659900 INFO: task kworker/0:276:5386 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c1d8f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:5389 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r5:85636000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f5e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85636000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558378c r4:85583400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8558378c r4:8569b200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85636000 r8:8569b22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569b200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569b200 r8:8027ed34 r7:eb9bde60 r6:856a4d80 r5:85636000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f5fb0 to 0xeb9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856598c0 INFO: task kworker/0:277:5389 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c1fce000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:eb9f1d84 r8:00000002 r7:60000013 r6:eb9f1d8c r5:85634800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb649000 r7:ddde2d40 r6:83018200 r5:8566f78c r4:856a4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85634800 r8:856a4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4e00 r8:8027ed34 r7:eb9dde60 r6:856a4e80 r5:85634800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564f740 INFO: task kworker/1:846:5392 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c2505000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:847:5393 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:847 state:D stack:0 pid:5393 tgid:5393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9e9d84 r8:00000002 r7:60000113 r6:eb9e9d8c r5:85636c00 r4:85636c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85636c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564f780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85636c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb663000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566fb8c r4:8566f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566fb8c r4:856a4f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85636c00 r8:856a4f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856a4f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a4f00 r8:8027ed34 r7:eb9dde60 r6:856a4f80 r5:85636c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e9fb0 to 0xeb9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c2505000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:848:5396 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:848 state:D stack:0 pid:5396 tgid:5396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9edd84 r8:00000002 r7:60000013 r6:eb9edd8c r5:85635400 r4:85635400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85635400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fb00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85635400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb687000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567838c r4:85678000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567838c r4:8569f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85635400 r8:8569f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f080 r8:8027ed34 r7:eb9dde60 r6:8569f100 r5:85635400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:84bdfc80 r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85633000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb697000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567878c r4:85678400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567878c r4:8569f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85633000 r8:8569f02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f000 r8:8027ed34 r7:eb9ede60 r6:8569f180 r5:85633000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564fbc0 INFO: task kworker/1:849:5397 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c2a9e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 task:kworker/1:850 state:D stack:0 pid:5399 tgid:5399 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564ffc0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85678b8c r4:8569f200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562e000 r8:8569f22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f200 r8:8027ed34 r7:eb9f9e60 r6:8569f280 r5:8562e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564fe00 INFO: task kworker/1:850:5399 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c2d83000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:856d8000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:85679b8c r4:85679800 r4:00000001 r4:8564fe40 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a5040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85678f8c r4:85678c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85678f8c r4:8569f400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d8c00 r8:8569f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f400 r8:8027ed34 r7:eba01e60 r6:8569f480 r5:856d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba05fb0 to 0xeba05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564fe40 INFO: task kworker/1:852:5403 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c3048000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:278:5407 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba0dd84 r8:00000002 r7:60000113 r6:eba0dd8c r5:856da400 r4:856da400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856da400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c8400 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:5408 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:5408 tgid:5408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba15d84 r8:00000002 r7:60000113 r6:eba15d8c r5:856db000 r4:856db000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856db000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a5300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eb803000 r10:61c88647 r9:856db000 r8:8569f6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba15fb0 to 0xeba15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a5440 INFO: task kworker/1:854:5408 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c3a6f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 Not tainted 6.15.0-syzkaller #0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:8567ab8c r4:8567a800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a5500 INFO: task kworker/1:855:5411 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c3a6f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:856:5413 blocked for more than 470 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:856dc800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a5640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb825000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85679f8c r4:85679c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85679f8c r4:8569f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dc800 r8:8569f7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f780 r8:8027ed34 r7:eba11e60 r6:8569f900 r5:856dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba1dfb0 to 0xeba1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a5500 INFO: task kworker/1:856:5413 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c4268000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:857 state:D stack:0 pid:5415 tgid:5415 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba21e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a5800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb833000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567a38c r4:8567a000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567a38c r4:8569f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dd400 r8:8569f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f980 r8:8027ed34 r7:eba11e60 r6:8569fa00 r5:856dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba21fb0 to 0xeba21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a5a00 INFO: task kworker/1:857:5415 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c459b000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:858:5418 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:856de000 r8:8569faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a5c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb857000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567af8c r4:8567ac00 r7:ddde2d40 r6:83018200 r5:8567af8c r4:8569fb80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a5d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85070000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567b38c r4:8567b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567b38c r4:8569fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85070000 r8:8569fcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569fc80 r8:8027ed34 r7:eba29e60 r6:8569fd00 r5:85070000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856a5c40 INFO: task kworker/1:860:5422 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c4eef000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8569fd80 r8:8027ed34 r7:eba2de60 r6:8569fe00 r5:85070c00 r4:856a5d80 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:862:5425 blocked for more than 470 seconds. r4:85072400 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567b78c r4:8567b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567b78c r4:8569fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85072400 r8:8569feac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569fe80 r8:8027ed34 r7:eba31e60 r6:8569ff00 r5:85072400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba19fb0 to 0xeba19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c4100 INFO: task kworker/1:862:5425 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c5314000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:863:5427 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:863 state:D stack:0 pid:5427 tgid:5427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:85073000 r4:85073000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85073000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c42c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85073000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf21000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567bf8c r4:8567bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567bf8c r4:8569ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85073000 r8:8569ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ff80 r8:8027ed34 r7:eba31e60 r6:856c1000 r5:85073000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c5fb0 to 0xeb8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c4100 INFO: task kworker/1:863:5427 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c5643000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb055000 r7:ddde2d40 r6:83018200 r5:8568038c r4:856c1080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c5920000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:865:5433 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:865 state:D stack:0 pid:5433 tgid:5433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8ddd84 r8:00000002 r7:60000013 r6:eb8ddd8c r5:85074800 r4:85074800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85074800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb0d1000 r7:ddde2d40 r6:83018200 r5:8568078c r4:856c1180 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856c1280 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:867:5436 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:867 state:D stack:0 pid:5436 tgid:5436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba39d84 r8:00000002 r7:60000113 r6:eba39d8c r5:85076c00 r4:85076c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85076c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba39e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564f280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85076c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568178c r4:85681400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8568178c r4:856c1380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85076c00 r8:856c13ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c1380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c1380 r8:8027ed34 r7:eb8e1e60 r6:856c1400 r5:85076c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba39fb0 to 0xeba39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c4640 INFO: task kworker/1:867:5436 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c5e1e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:868:5437 blocked for more than 470 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 r5:85680f8c r4:85680c00 r10:00000000 r9:856c1480 r8:8027ed34 r7:eba39e60 r6:856c1500 r5:85071800 Exception stack(0xeba3dfb0 to 0xeba3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c4640 INFO: task kworker/1:868:5437 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c630c000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:5440 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:5440 tgid:5440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba45d84 r8:00000002 r7:60000113 r6:eba45d8c r5:85079800 r4:85079800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85079800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba45e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85079800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b9738c r4:84b97000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 task:kworker/1:869 state:D stack:0 pid:5442 tgid:5442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba49d84 r8:00000002 r7:60000113 r6:eba49d8c r5:8507a400 r4:8507a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c4d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb209000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568138c r4:85681000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8568138c r4:856c1600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507a400 r8:856c162c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c1600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c1600 r8:8027ed34 r7:eba39e60 r6:856c1680 r5:8507a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c4c80 INFO: task kworker/1:869:5442 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c6617000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:870:5443 blocked for more than 470 seconds. r4:85078c00 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba4de08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c9000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb321000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85681b8c r4:85681800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85681b8c r4:856c1800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:856c182c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c1800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c1800 r8:8027ed34 r7:eba4de60 r6:856c1880 r5:85078000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c4ac0 INFO: task kworker/1:871:5445 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c6a50000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eba41d84 r8:00000002 r7:60000113 r6:eba41d8c r5:8507bc00 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85681f8c r4:85681c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:856c9280 INFO: task kworker/1:872:5448 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c6a50000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:873 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8507c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba55e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c9440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb471000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568278c r4:85682400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8568278c r4:856c1a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507c800 r8:856c1a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c1a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c1a00 r8:8027ed34 r7:eba4de60 r6:856c1a80 r5:8507c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba55fb0 to 0xeba55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:874:5453 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:874 state:D stack:0 pid:5453 tgid:5453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:8507e000 r4:8507e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507e000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb503000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:875:5454 blocked for more than 470 seconds. r4:8507ec00 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85682b8c r4:85682800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:876:5455 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:876 state:D stack:0 pid:5455 tgid:5455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba61d84 r8:00000002 r7:60000113 r6:eba61d8c r5:8507b000 r4:8507b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c98c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85682f8c r4:85682c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85682f8c r4:856c1d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507b000 r8:856c1d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c1d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c1d00 r8:8027ed34 r7:eba35e60 r6:856c1d80 r5:8507b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d20: c7727000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:877:5458 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:877 state:D stack:0 pid:5458 tgid:5458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb551000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 r5:856e0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c9b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568378c r4:85683400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8568378c r4:856c1f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e0c00 r8:856c1f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c1f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c1f00 r8:8027ed34 r7:eba65e60 r6:856c1f80 r5:856e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r5:84b9738c r4:84b97000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb571000 r7:ddde2d40 r6:83018200 r5:85683f8c r4:856d1000 Exception stack(0xeba75fb0 to 0xeba75ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba7de08 r7:ddde2d40 r6:83018200 r5:8569038c r4:856d1080 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba7dfb0 to 0xeba7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506f100 INFO: task kworker/1:880:5464 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c8b92000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba81d84 r8:00000002 r7:60000013 r6:eba81d8c r5:8570e000 r4:8570e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506f640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8570e000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb881000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569138c r4:85691000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8569138c r4:856d1100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570e000 r8:856d112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d1100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d1100 r8:8027ed34 r7:eba7de60 r6:8569b480 r5:8570e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba81fb0 to 0xeba81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506f100 INFO: task kworker/1:881:5466 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c90d0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: c94ec000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:883:5469 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:883 state:D stack:0 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba91d84 r8:00000002 r7:60000013 r6:eba91d8c r5:85708c00 r4:85708c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85708c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506f380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85708c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb767000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85690b8c r4:85690800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85690b8c r4:856d1200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85708c00 r8:856d122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d1200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d1200 r8:8027ed34 r7:eba81e60 r6:8569b580 r5:85708c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba91fb0 to 0xeba91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506f240 INFO: task kworker/1:883:5469 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: c9c12000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba71d84 r8:00000002 r7:60000113 r6:eba71d8c r5:856e2400 r4:856e2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856e2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba71e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506f440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb877000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85690f8c r4:85690c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85690f8c r4:856d1280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e2400 r8:856d12ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d1280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d1280 r8:8027ed34 r7:eba81e60 r6:856d1300 r5:856e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506f300 INFO: task kworker/1:884:5471 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ca2d0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb8d1000 r7:ddde2d40 r6:83018200 r5:8569238c r4:856d1380 Exception stack(0xeba99fb0 to 0xeba99ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:886:5476 blocked for more than 471 seconds. r10:829187f4 r9:eba9dd84 r8:00000002 r7:60000013 r6:eba9dd8c r5:856e3c00 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506f740 r7:ddde2d40 r6:83018200 r5:8569178c r4:856d1480 r10:00000000 r9:856d1480 r8:8027ed34 r7:eba99e60 r6:856d1500 r5:856e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba9dfb0 to 0xeba9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506f6c0 INFO: task kworker/1:886:5476 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cae2d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:887:5478 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:887 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba6dd84 r8:00000002 r7:60000013 r6:eba6dd8c r5:856e4800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba6de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:85691b8c r4:85691800 r10:61c88647 r9:856e4800 r8:856d15ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: caf0a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:888:5480 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:888 state:D stack:0 pid:5480 tgid:5480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:856e5400 r4:856e5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856e5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xebaa1fb0 to 0xebaa1ff8) Workqueue: events bpf_prog_free_deferred 5d20: cb1fa000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856e6000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6e040 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85692f8c r4:85692c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85692f8c r4:856d1780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e6000 r8:856d17ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d1780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d1780 r8:8027ed34 r7:eba99e60 r6:856d1800 r5:856e6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaadfb0 to 0xebaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506fb80 INFO: task kworker/1:889:5483 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cb1fa000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:890:5484 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:890 state:D stack:0 pid:5484 tgid:5484 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856e6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:856e6c00 r8:856d18ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506fc80 INFO: task kworker/1:890:5484 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cb45f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 INFO: task kworker/1:891:5485 blocked for more than 471 seconds. task:kworker/1:891 state:D stack:0 pid:5485 tgid:5485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebab5d84 r8:00000002 r7:60000113 r6:ebab5d8c r5:856e1800 r4:856e1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856e1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c9fc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85692b8c r4:85692800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85692b8c r4:856d1980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e1800 r8:856d19ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d1980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d1980 r8:8027ed34 r7:ebaade60 r6:856d1a00 r5:856e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab5fb0 to 0xebab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c9f80 INFO: task kworker/1:891:5485 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cb988000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:892:5488 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:892 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebab1d84 r8:00000002 r7:60000013 r6:ebab1d8c r5:856e8000 r4:856e8000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856e8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6e280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569378c r4:85693400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8569378c r4:856d1a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e8000 r8:856d1aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d1a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d1a80 r8:8027ed34 r7:ebaade60 r6:856d1b00 r5:856e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab1fb0 to 0xebab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6e080 INFO: task kworker/1:892:5488 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856e8c00 r5:856e8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6e1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb963000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569338c r4:85693000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8569338c r4:856d1b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e8c00 r8:856d1bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d1b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d1b80 r8:8027ed34 r7:ebab1e60 r6:856d1c00 r5:856e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebabdfb0 to 0xebabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6e180 INFO: task kworker/1:893:5491 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cbc24000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:894:5492 blocked for more than 471 seconds. r10:829187f4 r9:ebac1d84 r8:00000002 r7:60000113 r6:ebac1d8c r5:856e9800 r5:856e9800 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85693f8c r4:85693c00 r10:61c88647 r9:856e9800 r8:856d1cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cbed8000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:895:5493 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:895 state:D stack:0 pid:5493 tgid:5493 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebab9d84 r8:00000002 r7:60000113 r6:ebab9d8c r5:856ea400 r4:856ea400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856ea400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:856d1d80 r8:8027ed34 r7:ebac1e60 r6:856d1e00 r5:856ea400 INFO: task kworker/1:895:5493 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856eb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:856d1e80 Exception stack(0xebac5fb0 to 0xebac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6e640 INFO: task kworker/1:896:5496 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cc20b000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:897:5498 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:897 state:D stack:0 pid:5498 tgid:5498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebacdd84 r8:00000002 r7:60000113 r6:ebacdd8c r5:856ebc00 r4:856ebc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856ebc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6ea40 INFO: task kworker/1:897:5498 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cc68c000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:898:5500 blocked for more than 471 seconds. r5:856ec800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b4478c r4:84b2c080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ec800 r8:84b2c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b2c080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2c080 r8:8027ed34 r7:ebacde60 r6:84b2c100 r5:856ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad5fb0 to 0xebad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6e8c0 INFO: task kworker/1:898:5500 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cc8b4000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:899 state:D stack:0 pid:5501 tgid:5501 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856ed400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b4578c r4:84b45400 r4:84b2c180 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856ee000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:84b44f8c r4:84b2c280 Exception stack(0xebae1fb0 to 0xebae1ff8) INFO: task kworker/1:900:5504 is blocked on a mutex likely owned by task kworker/0:133:3790. r5:800f0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:901:5505 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:901 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebae9d84 r8:00000002 r7:60000113 r6:ebae9d8c r5:856eec00 r4:856eec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856eec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b6ee40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4538c r4:84b45000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b4538c r4:84b2c380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856eec00 r8:84b2c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b2c380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2c380 r8:8027ed34 r7:ebac9e60 r6:84b2c400 r5:856eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae9fb0 to 0xebae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b6ec40 INFO: task kworker/1:901:5505 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cd24e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 INFO: task kworker/1:902:5507 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r5:85758000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b2c480 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:84b6ef80 INFO: task kworker/1:902:5507 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cd72d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:903:5510 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:903 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb09d84 r8:00000002 r7:60000013 r6:ebb09d8c r5:85759800 r4:85759800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85759800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb09e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85067240 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85759800 r8:84b2c5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8575b000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:84b4638c r4:84b2c680 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:e05e5dc0 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:905:5514 blocked for more than 471 seconds. r5:85758c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85067500 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85758c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb23000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4678c r4:84b46400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b4678c r4:84b2c780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85758c00 r8:84b2c7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b2c780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2c780 r8:8027ed34 r7:ebb19e60 r6:84b2c800 r5:85758c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebafdfb0 to 0xebafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85067440 INFO: task kworker/1:905:5514 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cdc2c000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:906:5517 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:906 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb21d84 r8:00000002 r7:60000113 r6:ebb21d8c r5:8575bc00 r4:8575bc00 r5:8575bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b46b8c r4:84b46800 r4:84b2c880 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05e5d20 to 0xe05e5d68) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:8575c800 r5:8575c800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bf340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8575c800 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b46f8c r4:84b46c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b46f8c r4:84b2c980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575c800 r8:84b2c9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b2c980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2c980 r8:8027ed34 r7:ebb21e60 r6:84b2ca00 r5:8575c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb2dfb0 to 0xebb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85067600 INFO: task kworker/1:907:5518 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ce259000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:908:5520 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:908 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb35d84 r8:00000002 r7:60000013 r6:ebb35d8c r5:8575d400 r4:8575d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8575d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8575d400 r8:84b2caac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85067b00 INFO: task kworker/1:908:5520 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ce259000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:5524 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:5524 tgid:5524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85709800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85709800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558338c r4:85583000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8558338c r4:8569b600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85709800 r8:8569b62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569b600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569b600 r8:8027ed34 r7:eb9f5e60 r6:8569b680 r5:85709800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb41fb0 to 0xebb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b37ac0 INFO: task kworker/0:280:5524 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:909 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8570a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb815e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b47f8c r4:84b2cb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570a400 r8:84b2cbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b2cb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2cb80 r8:8027ed34 r7:ebb35e60 r6:8569b700 r5:8570a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb815fb0 to 0xeb815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85067c00 INFO: task kworker/1:909:5526 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ce520000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:910:5527 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:910 state:D stack:0 pid:5527 tgid:5527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb811d84 r8:00000002 r7:60000113 r6:eb811d8c r5:85708000 r4:85708000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85708000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85708000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4778c r4:84b47400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b4778c r4:84b2cc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85708000 r8:84b2cc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b2cc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2cc00 r8:8027ed34 r7:eb815e60 r6:8569b780 r5:85708000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb811fb0 to 0xeb811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cee09000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb845d84 r8:00000002 r7:60000013 r6:eb845d8c r5:8570bc00 r4:8570bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb845e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8570bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb669000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516cf8c r4:8516cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516cf8c r4:8569b800 r10:00000000 r9:8569b800 r8:8027ed34 r7:eb9f5e60 r6:8569b880 r5:8570bc00 r4:84b37a40 Call trace: Exception stack(0xe05e5d20 to 0xe05e5d68) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:282 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8575ec00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8575ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf59000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85583b8c r4:85583800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85583b8c r4:8569b900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575ec00 r8:8569b92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569b900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569b900 r8:8027ed34 r7:eb845e60 r6:84b2cc80 r5:8575ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb49fb0 to 0xebb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b37a40 INFO: task kworker/0:282:5530 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cf2b6000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:283:5532 blocked for more than 471 seconds. task:kworker/0:283 state:D stack:0 pid:5532 tgid:5532 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8575e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85583f8c r4:85583c00 r4:8569b980 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:284 state:D stack:0 pid:5535 tgid:5535 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856f1800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:841f078c r4:841f0400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f078c r4:8569ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f1800 r8:8569ba2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ba00 r8:8027ed34 r7:eb845e60 r6:84b2cd80 r5:856f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb5dfb0 to 0xebb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b37540 INFO: task kworker/0:284:5535 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cf7aa000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:285:5536 blocked for more than 471 seconds. r4:856f0000 r5:856f0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b37440 r5:841f038c r4:841f0000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:286 state:D stack:0 pid:5538 tgid:5538 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856f3000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85067b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516c38c r4:8516c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516c38c r4:8569bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f3000 r8:8569bb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569bb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569bb00 r8:8027ed34 r7:eb845e60 r6:84b2ce80 r5:856f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb71fb0 to 0xebb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85067ac0 INFO: task kworker/0:286:5538 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cf85f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:287:5540 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:287 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb79d84 r8:00000002 r7:60000013 r6:ebb79d8c r5:856f2400 r4:856f2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516c78c r4:8516c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516c78c r4:8569bb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f2400 r8:8569bbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569bb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569bb80 r8:8027ed34 r7:eb845e60 r6:84b2cf00 r5:856f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb79fb0 to 0xebb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b37200 INFO: task kworker/0:287:5540 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: cffd0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:5542 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9cdd84 r8:00000002 r7:60000013 r6:eb9cdd8c r5:8570b000 r4:8570b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8570b000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516cb8c r4:8516c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516cb8c r4:8569bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570b000 r8:8569bc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569bc00 r10:00000000 r9:8569bc00 r8:8027ed34 r7:eb845e60 r6:8569bc80 r5:8570b000 INFO: task kworker/0:288:5542 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8507d400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c5c0 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:289:5547 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:289 state:D stack:0 pid:5547 tgid:5547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb81d84 r8:00000002 r7:60000113 r6:ebb81d8c r5:8495ec00 r4:8495ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850684c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8495ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516d38c r4:8516d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516d38c r4:8569bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495ec00 r8:8569bdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569bd80 r8:8027ed34 r7:eb845e60 r6:8569be00 r5:8495ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb81fb0 to 0xebb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850683c0 INFO: task kworker/0:289:5547 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d08dc000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b9738c r4:84b97000 r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:290 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848e8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r5:00001000 r4:e00df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:848e8c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:8516d78c r4:8516d400 r4:8569bf80 r10:00000000 r9:8569bf80 r8:8027ed34 r7:ebb85e60 r6:84b61000 r5:848e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb89fb0 to 0xebb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85068400 INFO: task kworker/0:291:5551 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d0bed000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:292:5553 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:292 state:D stack:0 pid:5553 tgid:5553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:848e9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:848ea400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:848ea400 r8:84b611ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85068900 INFO: task kworker/0:293:5555 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d0bed000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:5556 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebba1d84 r8:00000002 r7:60000113 r6:ebba1d8c r5:848eb000 r4:848eb000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848eb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b61280 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:848ebc00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:5561 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:5561 tgid:5561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebba9d84 r8:00000002 r7:60000013 r6:ebba9d8c r5:848ec800 r4:848ec800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ec800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b376c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb839000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516ef8c r4:8516ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516ef8c r4:84b61480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ec800 r8:84b614ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b61480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b61480 r8:8027ed34 r7:ebba1e60 r6:84b61500 r5:848ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85068e40 INFO: task kworker/0:296:5561 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848ed400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3040 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb851000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516f38c r4:8516f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516f38c r4:84b61580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ed400 r8:84b615ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b61580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b61580 r8:8027ed34 r7:ebba9e60 r6:84b61600 r5:848ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbadfb0 to 0xebbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd3080 INFO: task kworker/0:297:5563 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d1d27000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:298 state:D stack:0 pid:5566 tgid:5566 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848ee000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b61680 r8:8027ed34 r7:ebbade60 r6:84b61700 r5:848ee000 r4:84bd3300 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:848eec00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8516fb8c r4:84b61780 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:5569 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:5569 tgid:5569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbb9d84 r8:00000002 r7:60000113 r6:ebbb9d8c r5:85718000 r4:85718000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85718000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85718000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516ff8c r4:8516fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516ff8c r4:84b61880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85718000 r8:84b618ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b61880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b61880 r8:8027ed34 r7:ebbb5e60 r6:84b61900 r5:85718000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb9fb0 to 0xebbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd3380 INFO: task kworker/0:300:5569 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d21bf000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85718c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8578838c r4:84b61980 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:5573 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:5573 tgid:5573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbc1d84 r8:00000002 r7:60000113 r6:ebbc1d8c r5:85719800 r4:85719800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85719800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85719800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbe1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578938c r4:85789000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578938c r4:84b61a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85719800 r8:84b61aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b61a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b61a80 r8:8027ed34 r7:ebbbde60 r6:84b61b00 r5:85719800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc1fb0 to 0xebbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd3680 INFO: task kworker/0:302:5573 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:303:5575 blocked for more than 472 seconds. r4:8571a400 r5:8571a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3880 r5:8578878c r4:85788400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578878c r4:84b61b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571a400 r8:84b61bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b61b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b61b80 r8:8027ed34 r7:ebbc1e60 r6:84b61c00 r5:8571a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbcdfb0 to 0xebbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd3840 INFO: task kworker/0:303:5575 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d2978000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:5578 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:5578 tgid:5578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbd5d84 r8:00000002 r7:60000113 r6:ebbd5d8c r5:8571b000 r4:8571b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8571b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8571b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8571b000 r8:84b61cac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r4:00000000 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829187f4 r9:ebbf9d84 r8:00000002 r7:60000013 r6:ebbf9d8c r5:856f0c00 r5:856f0c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08 r9:83018205 r8:856f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f015000 r5:00001000 r4:e88c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b47b8c r4:84b47800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b47b8c r4:856c5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f0c00 r8:856c502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c5000 r8:8027ed34 r7:eb815e60 r6:856c5080 r5:856f0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf9fb0 to 0xebbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8506ce40 INFO: task kworker/1:912:5579 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d35f1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:5581 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:5581 tgid:5581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:856f5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec405e08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84b61d80 r8:8027ed34 r7:ebbc1e60 r6:856c5100 r5:856f5400 r4:84bd3bc0 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f6c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec40de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850680c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec401000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85789b8c r4:85789800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85789b8c r4:84b61e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f6c00 r8:84b61e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b61e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b61e00 r8:8027ed34 r7:ec405e60 r6:856c5180 r5:856f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec40dfb0 to 0xec40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bd3d80 INFO: task kworker/0:306:5583 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d35f1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:856f6000 r5:856f6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec411e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:856f6000 r8:84b61eac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:5586 tgid:5586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec429d84 r8:00000002 r7:60000113 r6:ec429d8c r5:85075400 r4:85075400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85075400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec429e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c7180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85075400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec421000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578a38c r4:8578a000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578a38c r4:84b61f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85075400 r8:84b61f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b61f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b61f00 r8:8027ed34 r7:ec411e60 r6:856c5280 r5:85075400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec429fb0 to 0xec429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c70c0 INFO: task kworker/0:308:5586 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d3a26000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:5588 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:5588 tgid:5588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec435d84 r8:00000002 r7:60000113 r6:ec435d8c r5:856f3c00 r4:856f3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b61f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b61f80 r8:8027ed34 r7:ec429e60 r6:856c5300 r5:856f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec435fb0 to 0xec435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c72c0 INFO: task kworker/0:309:5588 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d4294000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:310:5592 blocked for more than 472 seconds. r5:856f8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec439fb0 to 0xec439ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:913 state:D stack:0 pid:5593 tgid:5593 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856f8c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec43de08 r9:83018205 r8:856f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2438c r4:84b24000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2438c r4:856c5400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f8c00 r8:856c542c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c5400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c5400 r8:8027ed34 r7:eb815e60 r6:856c5480 r5:856f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec43dfb0 to 0xec43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bf300 INFO: task kworker/1:913:5593 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d47fb000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:914:5597 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:914 state:D stack:0 pid:5597 tgid:5597 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba95d84 r8:00000002 r7:60000113 r6:eba95d8c r5:856f9800 r4:856f9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bf800 r9:83018205 r8:856f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r10:61c88647 r9:856f9800 r8:856c552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c5500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c5500 r8:8027ed34 r7:ec43de60 r6:856c5580 r5:856f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba95fb0 to 0xeba95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bf8c0 INFO: task kworker/1:914:5597 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d47fb000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:915:5598 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:915 state:D stack:0 pid:5598 tgid:5598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbe5d84 r8:00000002 r7:60000113 r6:ebbe5d8c r5:856fa400 r4:856fa400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fa400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bfd00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b24f8c r4:84b24c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b24f8c r4:856c5680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:856c5680 r8:8027ed34 r7:eba95e60 r6:856c5700 r5:856fa400 r4:856bf8c0 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d4ecb000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:916:5599 blocked for more than 472 seconds. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bf9c0 r7:ddde2d40 r6:83018200 r5:84b24b8c r4:856c5780 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:917:5602 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:917 state:D stack:0 pid:5602 tgid:5602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec441d84 r8:00000002 r7:60000013 r6:ec441d8c r5:856fbc00 r4:856fbc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fbc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec441e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bfd80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb221000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2538c r4:84b25000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2538c r4:856c5800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fbc00 r8:856c582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c5800 r8:8027ed34 r7:ebbe5e60 r6:856c5880 r5:856fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec441fb0 to 0xec441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bfe80 INFO: task kworker/1:917:5602 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d52e2000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:84b9738c r4:84b97000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:856fc800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bd0 r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:919:5605 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:919 state:D stack:0 pid:5605 tgid:5605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec449d84 r8:00000002 r7:60000113 r6:ec449d8c r5:856fd400 r4:856fd400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec449e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d0040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb303000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2578c r4:84b25400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2578c r4:856c5a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fd400 r8:856c5a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c5a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c5a00 r8:8027ed34 r7:ec44de60 r6:856c5a80 r5:856fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec449fb0 to 0xec449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bfe40 INFO: task kworker/1:919:5605 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d5a97000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r5:00001000 r4:e00df000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:920 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856fe000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec451e08 r9:83018205 r8:856fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec451fb0 to 0xec451ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r4:82ac21e4 r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:921:5610 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:921 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec459d84 r8:00000002 r7:60000013 r6:ec459d8c r5:856fec00 r4:856fec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec459e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d0580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2638c r4:84b26000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2638c r4:856c5c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fec00 r8:856c5c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c5c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c5c00 r8:8027ed34 r7:ec451e60 r6:856c5c80 r5:856fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec459fb0 to 0xec459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d0240 INFO: task kworker/1:921:5610 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bbf4c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85760c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:856c5d00 r8:8027ed34 r7:ec459e60 r6:856c5d80 r5:85760c00 r4:856d0540 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:923:5614 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:923 state:D stack:0 pid:5614 tgid:5614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec461d84 r8:00000002 r7:60000013 r6:ec461d8c r5:85762400 r4:85762400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85762400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec461e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d0740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85762400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ff000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2678c r4:84b26400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2678c r4:856c5e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85762400 r8:856c5e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c5e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c5e00 r8:8027ed34 r7:ec45de60 r6:856c5e80 r5:85762400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec461fb0 to 0xec461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d0700 INFO: task kworker/1:923:5614 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d60b1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r4:82ac21e4 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8571c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:925:5617 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:925 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec469d84 r8:00000002 r7:60000113 r6:ec469d8c r5:8571bc00 r4:8571bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8571bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec469e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d0b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8571bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb565000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b26f8c r4:84b26c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b26f8c r4:856c5f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571bc00 r8:856c5fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856c5f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c5f80 r8:8027ed34 r7:ec45de60 r6:856cb100 r5:8571bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec469fb0 to 0xec469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d0240 INFO: task kworker/1:925:5617 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d6542000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:926 state:D stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8571e000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84b2778c r4:856d4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571e000 r8:856d402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4000 r8:8027ed34 r7:ec45de60 r6:856cb180 r5:8571e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec479fb0 to 0xec479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d0a80 INFO: task kworker/1:926:5620 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d6844000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:927 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8571ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd040 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8571d400 r5:8571d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec481e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bf000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8571d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b27b8c r4:84b27800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b27b8c r4:856d4100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571d400 r8:856d412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4100 r8:8027ed34 r7:ec47de60 r6:856cb280 r5:8571d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec481fb0 to 0xec481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d0cc0 INFO: task kworker/1:928:5624 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d6d4c000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:929:5626 blocked for more than 472 seconds. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:856f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 r7:ddde2d40 r6:83018200 r5:8573c78c r4:856d4180 Exception stack(0xec485fb0 to 0xec485ff8) INFO: task kworker/1:929:5626 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:930:5628 blocked for more than 472 seconds. r4:844c8c00 r5:844c8c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec48de08 r4:00000000 r9:83018205 r8:844c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573c38c r4:8573c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8573c38c r4:856d4200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c8c00 r8:856d422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4200 r8:8027ed34 r7:ec485e60 r6:856cb380 r5:844c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec48dfb0 to 0xec48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd1c0 INFO: task kworker/1:930:5628 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d70a4000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:931:5629 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:931 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:844c9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec491e08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec491fb0 to 0xec491ff8) INFO: task kworker/1:931:5629 is blocked on a mutex likely owned by task kworker/0:133:3790. r5:800f0013 r4:80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:311 state:D stack:0 pid:5631 tgid:5631 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844ca400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec455e08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578af8c r4:8578ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578af8c r4:856cb480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ca400 r8:856cb4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856cb480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb480 r8:8027ed34 r7:ec435e60 r6:856cb500 r5:844ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec455fb0 to 0xec455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c7e40 INFO: task kworker/0:311:5631 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d75d7000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84bbf4c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:844cb000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec495e08 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec495fb0 to 0xec495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd4c0 INFO: task kworker/1:932:5634 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d77e9000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:933:5636 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:933 state:D stack:0 pid:5636 tgid:5636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec499d84 r8:00000002 r7:60000113 r6:ec499d8c r5:844cbc00 r4:844cbc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844cbc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec499e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cdfc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:844cbc00 r8:856d43ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:934 state:D stack:0 pid:5638 tgid:5638 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844cc800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec49de08 r9:83018205 r8:844cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r10:61c88647 r9:844cc800 r8:856d442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:935:5639 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:935 state:D stack:0 pid:5639 tgid:5639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec489d84 r8:00000002 r7:60000113 r6:ec489d8c r5:85763c00 r4:85763c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85763c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec489e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85763c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573d38c r4:8573d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8573d38c r4:856d4480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85763c00 r8:856d44ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4480 r8:8027ed34 r7:ec499e60 r6:856d4500 r5:85763c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec489fb0 to 0xec489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd580 INFO: task kworker/1:935:5639 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d7d9f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bbf4c0 task:kworker/1:936 state:D stack:0 pid:5642 tgid:5642 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85763000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85763000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573db8c r4:8573d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8573db8c r4:856d4580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85763000 r8:856d45ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4580 r8:8027ed34 r7:ec499e60 r6:856d4600 r5:85763000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a5fb0 to 0xec4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd480 INFO: task kworker/1:936:5642 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d7d9f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:312:5643 blocked for more than 473 seconds. r10:829187f4 r9:ec4add84 r8:00000002 r7:60000013 r6:ec4add8c r5:85765400 r5:85765400 r4:829187f0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85765400 r8:856cb72c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec4b5d84 r8:00000002 r7:60000113 r6:ec4b5d8c r5:85766000 r4:85766000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85766000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4a800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85766000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a038c r4:857a0000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a038c r4:856cb780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85766000 r8:856cb7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856cb780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb780 r8:8027ed34 r7:ec4ade60 r6:856d4700 r5:85766000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b5fb0 to 0xec4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856b7080 INFO: task kworker/0:313:5645 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d827d000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:5647 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:5647 tgid:5647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85764800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:856cb800 r8:8027ed34 r7:ec4b5e60 r6:856d4780 r5:85764800 r4:856b7080 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec475d84 r8:00000002 r7:60000113 r6:ec475d8c r5:844cd400 r5:844cd400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec475e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4a680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f0b8c r4:841f0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f0b8c r4:856cb880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cd400 r8:856cb8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856cb880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb880 r8:8027ed34 r7:ec4b5e60 r6:856cb900 r5:844cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec475fb0 to 0xec475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856b7080 INFO: task kworker/0:315:5649 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d86f9000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:844cec00 r5:844cec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb940 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebb55fb0 to 0xebb55ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844c8000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec409e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d0e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea90f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573df8c r4:8573dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8573df8c r4:856d4880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c8000 r8:856d48ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4880 r8:8027ed34 r7:ebb55e60 r6:856cba00 r5:844c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec409fb0 to 0xec409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd3c0 INFO: task kworker/1:938:5653 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d9074000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85730c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bbf4c0 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:940 state:D stack:0 pid:5657 tgid:5657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec4c9d84 r8:00000002 r7:60000113 r6:ec4c9d8c r5:85730000 r4:85730000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85730000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd3980 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85730000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573e78c r4:8573e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8573e78c r4:856d4980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85730000 r8:856d49ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4980 r8:8027ed34 r7:ebb55e60 r6:856cbb00 r5:85730000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4c9fb0 to 0xec4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd700 INFO: task kworker/1:940:5657 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r5:800f0013 r4:80239bd0 r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:941:5659 blocked for more than 473 seconds. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85731800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:856d4a00 r8:8027ed34 r7:ebb55e60 r6:856cbb80 r5:85731800 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85733c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8573ef8c r4:856d4a80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:943:5663 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:943 state:D stack:0 pid:5663 tgid:5663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec4e1d84 r8:00000002 r7:60000113 r6:ec4e1d8c r5:85733000 r4:85733000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85733000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4e1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85733000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb601000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8573f38c r4:8573f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8573f38c r4:856d4b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85733000 r8:856d4b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4b00 r8:8027ed34 r7:ebb55e60 r6:856cbc80 r5:85733000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4e1fb0 to 0xec4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bb140 INFO: task kworker/1:943:5663 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d20: d9bfe000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85732400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8573f78c r4:8573f400 r4:856d4b80 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: d9bfe000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:945:5667 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:945 state:D stack:0 pid:5667 tgid:5667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec4f1d84 r8:00000002 r7:60000013 r6:ec4f1d8c r5:85734800 r4:85734800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85734800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85734800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85736000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 INFO: task kworker/1:947:5671 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:947 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec4bdd84 r8:00000002 r7:60000113 r6:ec4bdd8c r5:85766c00 r4:85766c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85766c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85766c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574038c r4:85740000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574038c r4:856d4d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85766c00 r8:856d4d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4d00 r8:8027ed34 r7:ebb55e60 r6:856d4d80 r5:85766c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4bdfb0 to 0xec4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bb900 INFO: task kworker/1:947:5671 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: da34e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85760000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f9e08 r9:83018205 r8:85760000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r10:61c88647 r9:85760000 r8:856d4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:949:5676 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:949 state:D stack:0 pid:5676 tgid:5676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec505d84 r8:00000002 r7:60000113 r6:ec505d8c r5:85761800 r4:85761800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85761800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bbcc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85761800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85740f8c r4:85740c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85740f8c r4:856d4f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85761800 r8:856d4f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856d4f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4f00 r8:8027ed34 r7:ec4f9e60 r6:856d4f80 r5:85761800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec505fb0 to 0xec505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bba00 INFO: task kworker/1:949:5676 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: da60e000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8575a400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dad35000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:951:5681 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:951 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec519d84 r8:00000002 r7:60000113 r6:ec519d8c r5:85736c00 r4:85736c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85736c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8574138c r4:85741000 r10:61c88647 r9:85736c00 r8:84bb412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:952:5682 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:952 state:D stack:0 pid:5682 tgid:5682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec51dd84 r8:00000002 r7:60000113 r6:ec51dd8c r5:85735400 r4:85735400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85735400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec51de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85735400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r10:61c88647 r9:85735400 r8:84bb41ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:840d1800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:840d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:954:5686 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:954 state:D stack:0 pid:5686 tgid:5686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec539d84 r8:00000002 r7:60000013 r6:ec539d8c r5:840d2400 r4:840d2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840d2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec539e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4e2c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574238c r4:85742000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574238c r4:84bb4280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840d2400 r8:84bb42ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb4280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb4280 r8:8027ed34 r7:ec535e60 r6:84bd6000 r5:840d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec539fb0 to 0xec539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:840d0c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8574278c r4:84bb4380 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4e3c0 INFO: task kworker/1:955:5689 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: db46f000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf4c0 task:kworker/1:956 state:D stack:0 pid:5690 tgid:5690 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85768c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebb27000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84bb4300 r8:8027ed34 r7:ec545e60 r6:84bb4400 r5:85768c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec515fb0 to 0xec515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4e3c0 INFO: task kworker/1:956:5690 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: db8c4000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec511d84 r8:00000002 r7:60000113 r6:ec511d8c r5:85769800 r5:85769800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8574338c r4:85743000 r10:61c88647 r9:85769800 r8:84bb44ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec541d84 r8:00000002 r7:60000013 r6:ec541d8c r5:8576a400 r5:8576a400 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4e700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8576a400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb3b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85742f8c r4:85742c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85742f8c r4:84bb4580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576a400 r8:84bb45ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb4580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb4580 r8:8027ed34 r7:ec511e60 r6:84bb4600 r5:8576a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec541fb0 to 0xec541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4e6c0 INFO: task kworker/1:958:5694 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dbca3000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b9738c r4:84b97000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:8576b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4e800 INFO: task kworker/1:959:5696 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dbea1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:960:5697 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:ec551d84 r8:00000002 r7:60000013 r6:ec551d8c r5:8576c800 r5:8576c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574c78c r4:8574c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574c78c r4:84bb4780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576c800 r8:84bb47ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb4780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb4780 r8:8027ed34 r7:ec54de60 r6:84bb4800 r5:8576c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec551fb0 to 0xec551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4e900 INFO: task kworker/1:960:5697 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d20: dbea1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r5:84b9738c r4:84b97000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 INFO: task kworker/1:961:5700 blocked for more than 473 seconds. r4:8576e000 r5:8576e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b41100 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8576bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec565e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8576bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a1f8c r4:857a1c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a1f8c r4:84bd6100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576bc00 r8:84bd612c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd6100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd6100 r8:8027ed34 r7:ec4b5e60 r6:84bb4980 r5:8576bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec565fb0 to 0xec565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4a780 INFO: task kworker/0:316:5703 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dc1c0000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85768000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:85768000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 r10:61c88647 r9:85768000 r8:84bd61ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:5706 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:5706 tgid:5706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec591d84 r8:00000002 r7:60000113 r6:ec591d8c r5:8576d400 r4:8576d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8576d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec591e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4aa80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8576d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbed000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a0b8c r4:857a0800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a0b8c r4:84bd6200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576d400 r8:84bd622c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd6200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd6200 r8:8027ed34 r7:ec565e60 r6:84bb4a80 r5:8576d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec591fb0 to 0xec591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4a780 INFO: task kworker/0:318:5706 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dc9cc000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85770000 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:857a138c r4:857a1000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05e5d20 to 0xe05e5d68) r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:962:5711 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:962 state:D stack:0 pid:5711 tgid:5711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec59dd84 r8:00000002 r7:60000113 r6:ec59dd8c r5:85770c00 r4:85770c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85770c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec59de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b41280 r9:83018205 r8:85770c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r10:61c88647 r9:85770c00 r8:84bb4bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r4:00000000 r5:84b9738c r4:84b97000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 INFO: task kworker/1:963:5713 blocked for more than 473 seconds. r5:840d3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8574c38c r4:8574c000 r4:84bb4c80 Exception stack(0xec549fb0 to 0xec549ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05e5dc0 r4:00000000 r5:84b9738c r4:84b97000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:964 state:D stack:0 pid:5715 tgid:5715 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:840d4800 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:840d4800 r8:84bb4d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb4d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb4d00 r8:8027ed34 r7:ec551e60 r6:84bd6380 r5:840d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a1fb0 to 0xec5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b415c0 INFO: task kworker/1:964:5715 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dd2bb000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:965:5718 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:965 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5b1d84 r8:00000002 r7:60000113 r6:ec5b1d8c r5:840d6c00 r4:840d6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b1e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:840d0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eace3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574d38c r4:8574d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574d38c r4:84bb4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840d0000 r8:84bb4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb4e00 r8:8027ed34 r7:ec5a1e60 r6:84bd6480 r5:840d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b5fb0 to 0xec5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b41880 INFO: task kworker/1:966:5719 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dd2bb000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:967:5720 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:967 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec595d84 r8:00000002 r7:60000113 r6:ec595d8c r5:85771800 r4:85771800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85771800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec595e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b41b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85771800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb033000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85771800 r8:84bb4eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb4e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb4e80 r8:8027ed34 r7:ec5b5e60 r6:84bb4f00 r5:85771800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec595fb0 to 0xec595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b41880 INFO: task kworker/1:967:5720 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dd978000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:968 state:D stack:0 pid:5723 tgid:5723 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb71c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85773000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb481000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574eb8c r4:8574e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574eb8c r4:84bb4f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85773000 r8:84bb4fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb4f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb4f80 r8:8027ed34 r7:ec595e60 r6:84bda000 r5:85773000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5adfb0 to 0xec5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b41a40 INFO: task kworker/1:968:5723 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dd978000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r5:84b9738c r4:84b97000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:ec555d84 r8:00000002 r7:60000013 r6:ec555d8c r5:85773c00 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec555e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:eb13b000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574db8c r4:8574d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574db8c r4:84bda080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85773c00 r8:84bda0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda080 r8:8027ed34 r7:ec5ade60 r6:84bda100 r5:85773c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec555fb0 to 0xec555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b41a40 INFO: task kworker/1:969:5724 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: dda97000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:970:5727 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:970 state:D stack:0 pid:5727 tgid:5727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5bdd84 r8:00000002 r7:60000113 r6:ec5bdd8c r5:85774800 r4:85774800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85774800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b41dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85774800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574df8c r4:8574dc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574df8c r4:84bda180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85774800 r8:84bda1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda180 r8:8027ed34 r7:ec5ade60 r6:84bda200 r5:85774800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5bdfb0 to 0xec5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b41d40 INFO: task kworker/1:970:5727 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ddcae000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:971:5729 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:971 state:D stack:0 pid:5729 tgid:5729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5c9d84 r8:00000002 r7:60000113 r6:ec5c9d8c r5:840d3c00 r4:840d3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840d3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b41f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574e38c r4:8574e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574e38c r4:84bda280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840d3c00 r8:84bda2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda280 r8:8027ed34 r7:ec5ade60 r6:84bd6500 r5:840d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c9fb0 to 0xec5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b41d40 INFO: task kworker/1:971:5729 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ddcae000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:972:5730 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:972 state:D stack:0 pid:5730 tgid:5730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5cdd84 r8:00000002 r7:60000013 r6:ec5cdd8c r5:840d6000 r4:840d6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840d6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb7000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574e78c r4:8574e400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574e78c r4:84bda300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840d6000 r8:84bda32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda300 r8:8027ed34 r7:ec5ade60 r6:84bd6580 r5:840d6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5cdfb0 to 0xec5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b41d40 INFO: task kworker/1:972:5730 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: de4d1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:973:5733 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:973 state:D stack:0 pid:5733 tgid:5733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5d1d84 r8:00000002 r7:60000113 r6:ec5d1d8c r5:840d5400 r4:840d5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840d5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb7280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb517000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574ef8c r4:8574ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574ef8c r4:84bda380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840d5400 r8:84bda3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda380 r8:8027ed34 r7:ec5ade60 r6:84bd6600 r5:840d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d1fb0 to 0xec5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb7180 INFO: task kworker/1:973:5733 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: de4d1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:974:5735 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:974 state:D stack:0 pid:5735 tgid:5735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5d5d84 r8:00000002 r7:60000013 r6:ec5d5d8c r5:857b8000 r4:857b8000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857b8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb73c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574f38c r4:8574f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574f38c r4:84bda400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b8000 r8:84bda42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda400 r8:8027ed34 r7:ec5d1e60 r6:84bd6680 r5:857b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d5fb0 to 0xec5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb72c0 INFO: task kworker/1:974:5735 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: de4d1000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:975:5738 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:975 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5e9d84 r8:00000002 r7:60000113 r6:ec5e9d8c r5:857ba400 r4:857ba400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857ba400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb7540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6dd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5fde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb7840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574ff8c r4:8574fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8574ff8c r4:84bda500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857bbc00 r8:84bda52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda500 r8:8027ed34 r7:ec5e9e60 r6:84bd6780 r5:857bbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5fdfb0 to 0xec5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb74c0 INFO: task kworker/1:976:5740 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: de9b6000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:977:5741 blocked for more than 473 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb875000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec629fb0 to 0xec629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb74c0 INFO: task kworker/1:977:5741 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: ded26000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec639d84 r8:00000002 r7:60000013 r6:ec639d8c r5:857b9800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb7a40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575478c r4:85754400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575478c r4:84bda600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857b9800 r8:84bda62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda600 r8:8027ed34 r7:ec5fde60 r6:84bd6880 r5:857b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb7900 r5:8575438c r4:85754000 r7:ddde2d40 r6:83018200 r5:8575438c r4:84bda680 r4:84bda680 r10:00000000 r9:84bda680 r8:8027ed34 r7:ec639e60 r6:84bd6900 r5:857bb000 1fa0: 00000000 00000000 00000000 00000000 r4:84bb7b80 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:857bd400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb7b00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb959000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754b8c r4:85754800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85754b8c r4:84bda700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857bd400 r8:84bda72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda700 r8:8027ed34 r7:ec639e60 r6:84bd6980 r5:857bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec659fb0 to 0xec659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb79c0 INFO: task kworker/1:980:5747 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: df6ed000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:981:5749 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:981 state:D stack:0 pid:5749 tgid:5749 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xec65dfb0 to 0xec65dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:982:5751 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:982 state:D stack:0 pid:5751 tgid:5751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec665d84 r8:00000002 r7:60000013 r6:ec665d8c r5:857be000 r4:857be000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857be000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84790b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857be000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba89000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575578c r4:85755400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575578c r4:84bda800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857be000 r8:84bda82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda800 r8:8027ed34 r7:ec65de60 r6:84bd6a80 r5:857be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:e00df000 r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb7ec0 r9:83018205 r8:84980000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r5:8575538c r4:85755000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84bda880 r8:8027ed34 r7:ec665e60 r6:84bd6b00 r5:84980000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:984:5754 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:984 state:D stack:0 pid:5754 tgid:5754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec671d84 r8:00000002 r7:60000013 r6:ec671d8c r5:84981800 r4:84981800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84981800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec671e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84981800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec607000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85756f8c r4:85756c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85756f8c r4:84bda900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84981800 r8:84bda92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda900 r8:8027ed34 r7:ec665e60 r6:84bd6b80 r5:84981800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec671fb0 to 0xec671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb7e00 INFO: task kworker/1:984:5754 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: e007a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:985:5756 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:985 state:D stack:0 pid:5756 tgid:5756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec679d84 r8:00000002 r7:60000013 r6:ec679d8c r5:84980c00 r4:84980c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84980c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec679e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b7cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84980c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85755b8c r4:85755800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85755b8c r4:84bda980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84980c00 r8:84bda9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bda980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bda980 r8:8027ed34 r7:ec671e60 r6:84bd6c00 r5:84980c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec679fb0 to 0xec679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb7f40 INFO: task kworker/1:985:5756 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: e007a000 e00c9000 00000001 80239bb8 7f03f000 00000001 82ac21c4 82ac15a0 5d40: 7f03f000 e00c9000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bbf680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b9738c r4:84b97000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b9738c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:986:5759 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:986 state:D stack:0 pid:5759 tgid:5759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec685d84 r8:00000002 r7:60000013 r6:ec685d8c r5:84984800 r4:84984800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84984800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec685e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b4ef80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84984800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaed000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85755f8c r4:85755c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85755f8c r4:84bdaa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84984800 r8:84bdaa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdaa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdaa00 r8:8027ed34 r7:ec671e60 r6:84bd6c80 r5:84984800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec685fb0 to 0xec685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b4ef40 INFO: task kworker/1:986:5759 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 7f9ec000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 900f0013 ffffffff r5:900f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:987:5760 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:987 state:D stack:0 pid:5760 tgid:5760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec655d84 r8:00000002 r7:60000013 r6:ec655d8c r5:85776c00 r4:85776c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85776c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec655e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85776c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575638c r4:85756000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575638c r4:84bdaa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85776c00 r8:84bdaaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdaa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdaa80 r8:8027ed34 r7:ec671e60 r6:84bdab00 r5:85776c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec655fb0 to 0xec655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85154080 INFO: task kworker/1:987:5760 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 7f9ec000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 900f0013 ffffffff r5:900f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:988:5763 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:988 state:D stack:0 pid:5763 tgid:5763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec681d84 r8:00000002 r7:60000013 r6:ec681d8c r5:85776000 r4:85776000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85776000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851541c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85776000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575678c r4:85756400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575678c r4:84bdab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85776000 r8:84bdabac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdab80 r8:8027ed34 r7:ec671e60 r6:84bdac00 r5:85776000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec681fb0 to 0xec681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85154180 INFO: task kworker/1:988:5763 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 7ff30000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 900f0013 ffffffff r5:900f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:989:5765 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:989 state:D stack:0 pid:5765 tgid:5765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5c1d84 r8:00000002 r7:60000113 r6:ec5c1d8c r5:85775400 r4:85775400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85775400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85775400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85756b8c r4:85756800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85756b8c r4:84bdac80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85775400 r8:84bdacac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdac80 r8:8027ed34 r7:ec671e60 r6:84bdad00 r5:85775400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c1fb0 to 0xec5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85154400 INFO: task kworker/1:989:5765 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 7ff30000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 900f0013 ffffffff r5:900f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:990:5766 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:990 state:D stack:0 pid:5766 tgid:5766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec691d84 r8:00000002 r7:60000013 r6:ec691d8c r5:85772400 r4:85772400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85772400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec691e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85772400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ab000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575778c r4:85757400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8575778c r4:84bdad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85772400 r8:84bdadac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdad80 r8:8027ed34 r7:ec671e60 r6:84bdae00 r5:85772400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec691fb0 to 0xec691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85154400 INFO: task kworker/1:990:5766 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 80319000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:5769 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec699d84 r8:00000002 r7:60000113 r6:ec699d8c r5:85778000 r4:85778000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85778000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec699e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518fa40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85778000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec613000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575738c r4:85757000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8575738c r4:84bd6d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85778000 r8:84bd6d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd6d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd6d00 r8:8027ed34 r7:ec565e60 r6:84bdae80 r5:85778000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec699fb0 to 0xec699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518fa40 INFO: task kworker/0:320:5769 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 80319000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:5772 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:5772 tgid:5772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec6a1d84 r8:00000002 r7:60000113 r6:ec6a1d8c r5:85779800 r4:85779800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85779800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8518f440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85779800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec62f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a178c r4:857a1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a178c r4:84bd6d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85779800 r8:84bd6dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd6d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd6d80 r8:8027ed34 r7:ec565e60 r6:84bdaf00 r5:85779800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a1fb0 to 0xec6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f400 INFO: task kworker/0:321:5772 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 80560000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:991:5773 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:991 state:D stack:0 pid:5773 tgid:5773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec6a5d84 r8:00000002 r7:60000013 r6:ec6a5d8c r5:8577a400 r4:8577a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8577a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8577a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85757b8c r4:85757800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85757b8c r4:84bdaf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577a400 r8:84bdafac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bdaf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdaf80 r8:8027ed34 r7:ec691e60 r6:85166000 r5:8577a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a5fb0 to 0xec6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85154700 INFO: task kworker/1:991:5773 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 808a1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:5774 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec689d84 r8:00000002 r7:60000113 r6:ec689d8c r5:84983c00 r4:84983c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84983c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84983c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a1b8c r4:857a1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a1b8c r4:84bd6e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84983c00 r8:84bd6e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bd6e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd6e00 r8:8027ed34 r7:ec565e60 r6:84bd6e80 r5:84983c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8518f600 INFO: task kworker/0:322:5774 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 808a1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:992:5778 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:992 state:D stack:0 pid:5778 tgid:5778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec68dd84 r8:00000002 r7:60000113 r6:ec68dd8c r5:84982400 r4:84982400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84982400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85166080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166080 r8:8027ed34 r7:ec6a5e60 r6:84bd6f00 r5:84982400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85154e00 INFO: task kworker/1:992:5778 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 80d56000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:993:5780 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:993 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c1e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:994 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d1e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85166180 r8:8027ed34 r7:ec6c1e60 r6:8515a000 r5:84986000 r4:85154680 Call trace: 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:995:5784 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:995 state:D stack:0 pid:5784 tgid:5784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec6d5d84 r8:00000002 r7:60000013 r6:ec6d5d8c r5:84986c00 r4:84986c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84986c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516a000 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84986c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f478c r4:857f4400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f478c r4:85166200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84986c00 r8:8516622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166200 r8:8027ed34 r7:ec6c1e60 r6:8515a080 r5:84986c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d5fb0 to 0xec6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516a100 INFO: task kworker/1:995:5784 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:996:5786 blocked for more than 474 seconds. r4:84983000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84983000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6dde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516a200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84983000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6cd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f4b8c r4:857f4800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f4b8c r4:85166280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84983000 r8:851662ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166280 r8:8027ed34 r7:ec6c1e60 r6:8515a100 r5:84983000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6ddfb0 to 0xec6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516a0c0 INFO: task kworker/1:996:5786 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 81791000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:997:5788 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:997 state:D stack:0 pid:5788 tgid:5788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec6a9d84 r8:00000002 r7:60000013 r6:ec6a9d8c r5:857bec00 r4:857bec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857bec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a9e08 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:857f538c r4:857f5000 r10:61c88647 r9:84908000 r8:8515a22c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xec6e9fb0 to 0xec6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85164340 INFO: task kworker/0:323:5791 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 81ac0000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:998:5792 blocked for more than 474 seconds. task:kworker/1:998 state:D stack:0 pid:5792 tgid:5792 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec701fb0 to 0xec701ff8) r4:8516a700 Workqueue: events bpf_prog_free_deferred 5d20: 82015000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:5793 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:5793 tgid:5793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec709d84 r8:00000002 r7:60000113 r6:ec709d8c r5:8577c800 r4:8577c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8577c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec709e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8577c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb801000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a278c r4:857a2400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a278c r4:8515a300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577c800 r8:8515a32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8515a300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515a300 r8:8027ed34 r7:ec6e9e60 r6:85166480 r5:8577c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec709fb0 to 0xec709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85164440 INFO: task kworker/0:324:5793 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ed641000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:999 state:D stack:0 pid:5796 tgid:5796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec6f9d84 r8:00000002 r7:60000013 r6:ec6f9d8c r5:84908c00 r4:84908c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84908c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ab40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84908c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f5b8c r4:857f5800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f5b8c r4:85166500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84908c00 r8:8516652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166500 r8:8027ed34 r7:ec701e60 r6:8515a380 r5:84908c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f9fb0 to 0xec6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516a980 INFO: task kworker/1:999:5796 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 826b4000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 r5:85df1b8c r4:85df1800 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 task:kworker/1:1000 state:D stack:0 pid:5800 tgid:5800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec509e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f738c r4:85166580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490b000 r8:851665ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166580 r8:8027ed34 r7:ec701e60 r6:8515a400 r5:8490b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec509fb0 to 0xec509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516ac40 INFO: task kworker/1:1000:5800 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 826b4000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:1001:5801 blocked for more than 474 seconds. r5:8490bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec521e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85166600 r8:8027ed34 r7:ec509e60 r6:8515a480 r5:8490bc00 r4:8516ac40 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:82ac21e4 r4:00000000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1002:5804 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1002 state:D stack:0 pid:5804 tgid:5804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec70dd84 r8:00000002 r7:60000013 r6:ec70dd8c r5:8490d400 r4:8490d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8490d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec70de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516af40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8490d400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f678c r4:857f6400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8490d400 r8:851666ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1003:5805 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1003 state:D stack:0 pid:5805 tgid:5805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec711d84 r8:00000002 r7:60000113 r6:ec711d8c r5:8490a400 r4:8490a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:85166700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166700 r8:8027ed34 r7:ec509e60 r6:8515a580 r5:8490a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec711fb0 to 0xec711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8516a2c0 INFO: task kworker/1:1003:5805 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800f0013 r4:80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec715e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:85154700 Call trace: r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 task:kworker/0:325 state:D stack:0 pid:5811 tgid:5811 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec705d84 r8:00000002 r7:60000113 r6:ec705d8c r5:8490e000 r4:8490e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8490e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec705e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f200 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8490e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec803000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a338c r4:857a3000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857a338c r4:8515a680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490e000 r8:8515a6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8515a680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515a680 r8:8027ed34 r7:ec709e60 r6:8515a700 r5:8490e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec705fb0 to 0xec705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85164e00 INFO: task kworker/0:325:5811 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8490ec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec415e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:85164e00 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r5:00001000 r4:ed641000 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1005:5813 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1005 state:D stack:0 pid:5813 tgid:5813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec719d84 r8:00000002 r7:60000013 r6:ec719d8c r5:8490c800 r4:8490c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8490c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec719e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85169240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8490c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb863000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f778c r4:857f7400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f778c r4:85166800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490c800 r8:8516682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166800 r8:8027ed34 r7:ec509e60 r6:8515a880 r5:8490c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec719fb0 to 0xec719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85169080 INFO: task kworker/1:1005:5813 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8354e000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r5:800f0013 r4:80239bd0 r4:00000000 r5:85df1b8c r4:85df1800 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec721e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85169340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f7b8c r4:857f7800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f7b8c r4:85166880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85830c00 r8:851668ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166880 r8:8027ed34 r7:ec719e60 r6:8515a900 r5:85830c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec721fb0 to 0xec721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85169200 INFO: task kworker/1:1006:5815 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e5dc0 r5:00001000 r4:ed641000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec589e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85169540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85831800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb1d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f7f8c r4:857f7c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f7f8c r4:85166900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85831800 r8:8516692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166900 r8:8027ed34 r7:ec721e60 r6:8515a980 r5:85831800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec589fb0 to 0xec589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r5:00001000 r4:ed641000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec725e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:857a2f8c r4:857a2c00 r10:61c88647 r9:85832400 r8:8515aa2c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85833000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb39000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f838c r4:857f8000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f838c r4:85166980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833000 r8:851669ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166980 r8:8027ed34 r7:ec589e60 r6:8515ab00 r5:85833000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec729fb0 to 0xec729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85169500 INFO: task kworker/1:1008:5821 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 840b5000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1009:5823 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1009 state:D stack:0 pid:5823 tgid:5823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec731d84 r8:00000002 r7:60000013 r6:ec731d8c r5:85834800 r4:85834800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85834800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec731e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85169780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85834800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb59000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f878c r4:857f8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f878c r4:85166a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85834800 r8:85166a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166a00 r8:8027ed34 r7:ec729e60 r6:8515ab80 r5:85834800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec731fb0 to 0xec731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1010:5825 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1010 state:D stack:0 pid:5825 tgid:5825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec739d84 r8:00000002 r7:60000013 r6:ec739d8c r5:85833c00 r5:85833c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec739e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85169dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d20: 847d1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xec741fb0 to 0xec741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85169880 INFO: task kworker/1:1011:5827 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 849ff000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:85166b80 r10:00000000 r9:85166b80 r8:8027ed34 r7:ec739e60 r6:8515ad00 r5:85835400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec745fb0 to 0xec745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85169880 INFO: task kworker/1:1012:5828 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 849ff000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:1013:5830 blocked for more than 474 seconds. [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:857f938c r4:857f9000 r4:85166c00 Exception stack(0xec74dfb0 to 0xec74dff8) INFO: task kworker/1:1013:5830 is blocked on a mutex likely owned by task kworker/0:133:3790. Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:1014 state:D stack:0 pid:5832 tgid:5832 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f978c r4:857f9400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f978c r4:85166c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a1800 r8:85166cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166c80 r8:8027ed34 r7:ec739e60 r6:8515ae00 r5:850a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec755fb0 to 0xec755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85169b40 INFO: task kworker/1:1014:5832 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 84e52000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84bbf4c0 task:kworker/1:1015 state:D stack:0 pid:5834 tgid:5834 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec75de08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ec525000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec75dfb0 to 0xec75dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1016:5836 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1016 state:D stack:0 pid:5836 tgid:5836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec769d84 r8:00000002 r7:60000113 r6:ec769d8c r5:850a2400 r4:850a2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec769e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85169f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec46b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857f9f8c r4:857f9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857f9f8c r4:85166d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a2400 r8:85166dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166d80 r8:8027ed34 r7:ec75de60 r6:8515af00 r5:850a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec769fb0 to 0xec769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85169d40 INFO: task kworker/1:1016:5836 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 853e5000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:1017 state:D stack:0 pid:5838 tgid:5838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ec4a1000 r4:85166e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d20: 85c65000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:1018:5840 blocked for more than 474 seconds. [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec71de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8577e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4cb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fa78c r4:857fa400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fa78c r4:85166e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8577e000 r8:85166eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85166e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85166e80 r8:8027ed34 r7:ec75de60 r6:85166f00 r5:8577e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec71dfb0 to 0xec71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d1000 INFO: task kworker/1:1018:5840 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 85c65000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:1019:5843 blocked for more than 474 seconds. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:8577ec00 r8:85166fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:ed641000 r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1020:5845 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1020 state:D stack:0 pid:5845 tgid:5845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec779d84 r8:00000002 r7:60000113 r6:ec779d8c r5:85778c00 r4:85778c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85778c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec779e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85778c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4eb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851d6080 r8:8027ed34 r7:ec75de60 r6:851d6100 r5:85778c00 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1021:5846 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:1021 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d14c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8577d400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec50b000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851d6180 r8:8027ed34 r7:ec75de60 r6:851d6200 r5:8577d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 r4:00000000 r5:00001000 r4:ed641000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1840 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec72dfb0 to 0xec72dff8) r4:851d1640 Call trace: 5d20: 863af000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r4:00000000 r5:00001000 r4:ed641000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1024:5852 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1024 state:D stack:0 pid:5852 tgid:5852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec789d84 r8:00000002 r7:60000113 r6:ec789d8c r5:85838c00 r4:85838c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85838c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec789e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d1b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85838c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec585000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857fbf8c r4:857fbc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857fbf8c r4:851d6480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85838c00 r8:851d64ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d6480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d6480 r8:8027ed34 r7:ec785e60 r6:851d6500 r5:85838c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec789fb0 to 0xec789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d17c0 INFO: task kworker/1:1024:5852 is blocked on a mutex likely owned by task kworker/0:133:3790. [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:8583a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f2c0 r5:857a378c r4:857a3400 1fa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:5871 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:5871 tgid:5871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec819d84 r8:00000002 r7:60000113 r6:ec819d8c r5:8583c800 r4:8583c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8583c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec819e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d0d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8583c800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f1b8c r4:841f1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f1b8c r4:858a1080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583c800 r8:858a10ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1080 r8:8027ed34 r7:ec791e60 r6:851d6700 r5:8583c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec819fb0 to 0xec819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b2f300 INFO: task kworker/0:329:5871 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 867cf000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8583d400 r5:8583d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8583d400 r8:858a112c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:331:5947 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:5947 tgid:5947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8e5d84 r8:00000002 r7:60000113 r6:ec8e5d8c r5:8583b000 r4:8583b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8583b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d0e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8583b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f178c r4:841f1400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f178c r4:858a1180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583b000 r8:858a11ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:331:5947 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:8583bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ede08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84788e00 r5:841f138c r4:841f1000 r10:00000000 r9:858a1200 r8:8027ed34 r7:ec8e5e60 r6:851d6880 r5:8583bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05e5d20 to 0xe05e5d68) r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:333:5950 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:333 state:D stack:0 pid:5950 tgid:5950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8f1d84 r8:00000002 r7:60000013 r6:ec8f1d8c r5:8583ec00 r4:8583ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8583ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84788d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8583ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f115000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f278c r4:841f2400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f278c r4:858a1280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583ec00 r8:858a12ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1280 r8:8027ed34 r7:ec8ede60 r6:851d6900 r5:8583ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f1fb0 to 0xec8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d0e80 INFO: task kworker/0:333:5950 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 872e2000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:85843000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d20 to 0xe05e5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:6050 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:6050 tgid:6050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecabdd84 r8:00000002 r7:60000113 r6:ecabdd8c r5:85840c00 r4:85840c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85840c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecabde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84788c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85840c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f0f8c r4:841f0c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f0f8c r4:858a1380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85840c00 r8:858a13ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1380 r8:8027ed34 r7:ecab9e60 r6:851d6a00 r5:85840c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecabdfb0 to 0xecabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84788fc0 INFO: task kworker/0:335:6050 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 87809000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:6053 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:336 state:D stack:0 pid:6053 tgid:6053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecac9d84 r8:00000002 r7:60000013 r6:ecac9d8c r5:85844800 r4:85844800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85844800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85868b8c r4:85868800 r10:61c88647 r9:85844800 r8:858a142c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:337 state:D stack:0 pid:6055 tgid:6055 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85846000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad1e08 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85846000 r7:00000000 r6:83018000 r5:00001000 r4:7f18f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586878c r4:85868400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586878c r4:858a1480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85846000 r8:858a14ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1480 r8:8027ed34 r7:ecac9e60 r6:851d6b00 r5:85846000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad1fb0 to 0xecad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847888c0 INFO: task kworker/0:337:6055 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 87c7c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:850a3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85329200 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 87c7c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:6059 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:6059 tgid:6059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecad5d84 r8:00000002 r7:60000013 r6:ecad5d8c r5:850a5400 r4:850a5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854792c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f19b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Call trace: 5d20: 88234000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:340:6060 blocked for more than 475 seconds. r5:850a6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f195000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586938c r4:85869000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586938c r4:858a1700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a6c00 r8:858a172c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1700 r8:8027ed34 r7:ecad5e60 r6:858a1780 r5:850a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad9fb0 to 0xecad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85477ec0 INFO: task kworker/0:340:6060 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 88551000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:6063 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:6063 tgid:6063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:850a4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8586978c r4:85869400 r4:858a1800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:ed641000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:850a6000 r5:850a6000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854790c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f199000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5eb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85869b8c r4:85869800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85869b8c r4:858a1900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a6000 r8:858a192c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1900 r8:8027ed34 r7:ecad5e60 r6:858a1980 r5:850a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaa5fb0 to 0xecaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85479440 INFO: task kworker/0:342:6065 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 887de000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:343:6067 blocked for more than 475 seconds. r5:8576ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8586a38c r4:8586a000 r10:61c88647 r9:8576ec00 r8:858a1a2c r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:6070 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:6070 tgid:6070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecae9d84 r8:00000002 r7:60000013 r6:ecae9d8c r5:85830000 r4:85830000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85830000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854797c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85830000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6af000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586ab8c r4:8586a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586ab8c r4:858a1b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85830000 r8:858a1b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1b00 r8:8027ed34 r7:ecae1e60 r6:858a1b80 r5:85830000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae9fb0 to 0xecae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:854793c0 Call trace: 5d20: 88af5000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:345:6071 blocked for more than 475 seconds. r5:85836000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:858a1c00 r8:8027ed34 r7:ecae9e60 r6:858a1c80 r5:85836000 r4:854795c0 Call trace: 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:6073 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:6073 tgid:6073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecaf1d84 r8:00000002 r7:60000113 r6:ecaf1d8c r5:85218000 r4:85218000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85218000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85479a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85218000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ed000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586b38c r4:8586b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586b38c r4:858a1d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85218000 r8:858a1d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1d00 r8:8027ed34 r7:ecae9e60 r6:858a1d80 r5:85218000 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 88eca000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85845400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecafde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85479880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85845400 r7:00000000 r6:83018000 r5:00001000 r4:7f1a3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586af8c r4:8586ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586af8c r4:858a1e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85845400 r8:858a1e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1e00 r8:8027ed34 r7:ecaf1e60 r6:851d6b80 r5:85845400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecafdfb0 to 0xecafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854798c0 INFO: task kworker/0:347:6075 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8940d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:348 state:D stack:0 pid:6077 tgid:6077 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85842400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8586b78c r4:8586b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586b78c r4:858a1e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85842400 r8:858a1eac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1e80 r8:8027ed34 r7:ecaf1e60 r6:851d6c00 r5:85842400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb05fb0 to 0xecb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85479980 INFO: task kworker/0:348:6077 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 894e1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:6078 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:349 state:D stack:0 pid:6078 tgid:6078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb09d84 r8:00000002 r7:60000113 r6:ecb09d8c r5:85843c00 r4:85843c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85843c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb09e08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:858a1f00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r5:85df1b8c r4:85df1800 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:85846c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb11e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85479d80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85846c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec85d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586bb8c r4:8586b800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586bb8c r4:858a1f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85846c00 r8:858a1fac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a1f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a1f80 r8:8027ed34 r7:ecb09e60 r6:851d6d00 r5:85846c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb11fb0 to 0xecb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85479b40 INFO: task kworker/0:350:6080 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 898d4000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:85840000 r5:85840000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ca000 r8:8027ed34 r7:ecb09e60 r6:851d6d80 r5:85840000 r4:85479cc0 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 task:kworker/0:352 state:D stack:0 pid:6084 tgid:6084 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8583e000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec877000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587038c r4:85870000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587038c r4:849ca080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8583e000 r8:849ca0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ca080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca080 r8:8027ed34 r7:ecb09e60 r6:851d6e00 r5:8583e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c70c0 INFO: task kworker/0:352:6084 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 89d83000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:6087 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:6087 tgid:6087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:8577bc00 r5:8577bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85870b8c r4:85870800 r10:61c88647 r9:8577bc00 r8:849ca12c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r4:00000000 r5:00001000 r4:ed641000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:6089 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:6089 tgid:6089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb25d84 r8:00000002 r7:60000113 r6:ecb25d8c r5:850d0000 r4:850d0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850d0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb25e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f1b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec953000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85870f8c r4:85870c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85870f8c r4:849ca180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d0000 r8:849ca1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ca180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca180 r8:8027ed34 r7:ecb21e60 r6:851d6f00 r5:850d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb25fb0 to 0xecb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c7100 INFO: task kworker/0:354:6089 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8a442000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:355:6092 blocked for more than 475 seconds. r4:850d1800 r5:850d1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb2de08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:849ca200 dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:356:6093 blocked for more than 475 seconds. r5:850d3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7580 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587138c r4:85871000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587138c r4:849ca280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d3000 r8:849ca2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ca280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca280 r8:8027ed34 r7:ecb2de60 r6:8477f000 r5:850d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb35fb0 to 0xecb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c7440 INFO: task kworker/0:356:6093 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8a755000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:6094 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:357 state:D stack:0 pid:6094 tgid:6094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb39d84 r8:00000002 r7:60000113 r6:ecb39d8c r5:850d0c00 r4:850d0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850d0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587178c r4:85871400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587178c r4:849ca300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d0c00 r8:849ca32c r7:82804d40 r6:dddced40 r5:dddced60 r4:849ca300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca300 r8:8027ed34 r7:ecb2de60 r6:8477f080 r5:850d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb39fb0 to 0xecb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c7500 INFO: task kworker/0:357:6094 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8ad1a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e05e5dc0 r4:00000000 r5:85df1b8c r4:85df1800 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:6097 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:358 state:D stack:0 pid:6097 tgid:6097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb45d84 r8:00000002 r7:60000113 r6:ecb45d8c r5:850d2400 r4:850d2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850d2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f1b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:850d2400 r8:849ca3ac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r4:e05e5dc0 r5:00001000 r4:ed641000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 task:kworker/0:359 state:D stack:0 pid:6099 tgid:6099 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:850d3c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850d3c00 r8:849ca42c r7:82804d40 r6:dddced40 r5:dddced60 r4:849ca400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca400 r8:8027ed34 r7:ecb2de60 r6:8477f180 r5:850d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb51fb0 to 0xecb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c77c0 INFO: task kworker/0:359:6099 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8b229000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:360:6100 blocked for more than 475 seconds. r5:850d4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8587238c r4:85872000 r10:61c88647 r9:850d4800 r8:849ca4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ca480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca480 r8:8027ed34 r7:ecb2de60 r6:8477f200 r5:850d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c7900 INFO: task kworker/0:360:6100 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8b229000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:850d6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb69e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:850d6c00 r8:849ca52c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:8521a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb19e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521a400 r7:00000000 r6:83018000 r5:00001000 r4:7f1c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb65000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85872b8c r4:85872800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85872b8c r4:849ca580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521a400 r8:849ca5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ca580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca580 r8:8027ed34 r7:ecb2de60 r6:849ca600 r5:8521a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb19fb0 to 0xecb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c7bc0 INFO: task kworker/0:362:6104 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8b75b000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8521b000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849ca680 r8:8027ed34 r7:ecb2de60 r6:849ca700 r5:8521b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb75fb0 to 0xecb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c7e00 INFO: task kworker/0:363:6107 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8bb1c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:364 state:D stack:0 pid:6109 tgid:6109 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8521bc00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8587378c r4:849ca780 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:364:6109 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8521c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8521c800 r8:849ca8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ca880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca880 r8:8027ed34 r7:ecb81e60 r6:849ca900 r5:8521c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a92040 INFO: task kworker/0:365:6111 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8beac000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:6113 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:ecb95d84 r8:00000002 r7:60000113 r6:ecb95d8c r5:8521d400 r5:8521d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8521d400 r8:849ca9ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:6115 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:6115 tgid:6115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb9dd84 r8:00000002 r7:60000013 r6:ecb9dd8c r5:8521e000 r4:8521e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8521e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8521e000 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaef000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587838c r4:85878000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587838c r4:849caa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8521e000 r8:849caaac r7:82804d40 r6:dddced40 r5:dddced60 r4:849caa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849caa80 r8:8027ed34 r7:ecb95e60 r6:849cab00 r5:8521e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb9dfb0 to 0xecb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a92180 INFO: task kworker/0:367:6115 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8c2da000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:ed641000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:8521ec00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8521ec00 r8:849cabac r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:6119 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85219800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92780 r5:85878f8c r4:85878c00 r10:61c88647 r9:85219800 r8:849cacac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:370:6121 blocked for more than 475 seconds. r4:85218c00 r5:85218c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85218c00 r8:849cadac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:371:6123 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:371 state:D stack:0 pid:6123 tgid:6123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbb5d84 r8:00000002 r7:60000013 r6:ecbb5d8c r5:85841800 r4:85841800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85841800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92c80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85841800 r7:00000000 r6:83018000 r5:00001000 r4:7f1d7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec417000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587978c r4:85879400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587978c r4:849cae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85841800 r8:849caeac r7:82804d40 r6:dddced40 r5:dddced60 r4:849cae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849cae80 r8:8027ed34 r7:ecbade60 r6:849caf00 r5:85841800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb5fb0 to 0xecbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a927c0 INFO: task kworker/0:371:6123 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8cb90000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:84838c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebb13000 r7:dddced40 r6:83018000 r5:8587938c r4:849caf80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbbdd84 r8:00000002 r7:60000013 r6:ecbbdd8c r5:84838000 r4:84838000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84838000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbbde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92d40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84838000 r7:00000000 r6:83018000 r5:00001000 r4:7f1d9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85879b8c r4:85879800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85879b8c r4:85331080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84838000 r8:853310ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85331080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85331080 r8:8027ed34 r7:ecbb5e60 r6:85331100 r5:84838000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbbdfb0 to 0xecbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a92c40 INFO: task kworker/0:373:6128 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8d003000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:6130 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:6130 tgid:6130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbb9d84 r8:00000002 r7:60000113 r6:ecbb9d8c r5:8483a400 r4:8483a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r9:83018005 r8:8483a400 r7:00000000 r6:83018000 r5:00001000 r4:7f1dd000 r7:dddced40 r6:83018000 r5:8587a38c r4:85331180 Exception stack(0xecbb9fb0 to 0xecbb9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a92d80 INFO: task kworker/0:374:6130 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8d7b5000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8483bc00 r5:8483bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85331280 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 r4:00000000 r5:85df1b8c r4:85df1800 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8483c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:6136 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:6136 tgid:6136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbc9d84 r8:00000002 r7:60000113 r6:ecbc9d8c r5:8483d400 r4:8483d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85456400 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8483d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec799000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587af8c r4:8587ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587af8c r4:85331480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483d400 r8:853314ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85331480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85331480 r8:8027ed34 r7:ecbc1e60 r6:85331500 r5:8483d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbc9fb0 to 0xecbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8483e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85456340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8483e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec765000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587ab8c r4:8587a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587ab8c r4:85331580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483e000 r8:853315ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85331580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85331580 r8:8027ed34 r7:ecbc9e60 r6:85331600 r5:8483e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbcdfb0 to 0xecbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85456280 INFO: task kworker/0:378:6139 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8deda000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8483ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587b38c r4:8587b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587b38c r4:85331680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483ec00 r8:853316ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85331680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85331680 r8:8027ed34 r7:ecbc9e60 r6:85331700 r5:8483ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd1fb0 to 0xecbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85456440 INFO: task kworker/0:379:6140 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8deda000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:380 state:D stack:0 pid:6141 tgid:6141 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8483b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85456800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8483b000 r7:00000000 r6:83018000 r5:00001000 r4:7f1e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587b78c r4:8587b400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587b78c r4:85331780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483b000 r8:853317ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85331780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85331780 r8:8027ed34 r7:ecbd1e60 r6:85331800 r5:8483b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd5fb0 to 0xecbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85456440 INFO: task kworker/0:380:6141 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8e0b3000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84839800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:6146 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:6146 tgid:6146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85918000 r5:85918000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ec9b7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Call trace: [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:383:6148 blocked for more than 475 seconds. r5:85918c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe1e08 r9:83018005 r8:85918c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1ef000 r7:dddced40 r6:83018000 r5:8588078c r4:85331a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85918c00 r8:85331aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85331a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85331a80 r8:8027ed34 r7:ecbdde60 r6:85331b00 r5:85918c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854569c0 INFO: task kworker/0:383:6148 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8e887000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:6150 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:6150 tgid:6150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbe5d84 r8:00000002 r7:60000013 r6:ecbe5d8c r5:85919800 r4:85919800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85919800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85456c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85919800 r7:00000000 r6:83018000 r5:00001000 r4:7f1ed000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588038c r4:85880000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588038c r4:85331b80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:385 state:D stack:0 pid:6152 tgid:6152 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8591a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a92a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591a400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85880b8c r4:85880800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85880b8c r4:85331c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591a400 r8:85331cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85331c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85331c80 r8:8027ed34 r7:ecbe1e60 r6:85331d00 r5:8591a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe9fb0 to 0xecbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85456d00 INFO: task kworker/0:385:6152 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8ec88000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:6154 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:6154 tgid:6154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbedd84 r8:00000002 r7:60000113 r6:ecbedd8c r5:8591b000 r4:8591b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbede08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591b000 r7:00000000 r6:83018000 r5:00001000 r4:7f1f3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85880f8c r4:85880c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85880f8c r4:85331d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591b000 r8:85331dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85331d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85331d80 r8:8027ed34 r7:ecbe9e60 r6:85331e00 r5:8591b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbedfb0 to 0xecbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85456e40 INFO: task kworker/0:386:6154 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8ee7f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:387:6156 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbf1d84 r8:00000002 r7:60000113 r6:ecbf1d8c r5:8591bc00 r4:8591bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8591c800 r5:8591c800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f62c0 r9:83018005 r8:8591c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1f7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca05000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588178c r4:85881400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588178c r4:85331f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591c800 r8:85331fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85331f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85331f80 r8:8027ed34 r7:ecbf1e60 r6:851dd000 r5:8591c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f6140 INFO: task kworker/0:388:6158 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8f300000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:6160 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:6160 tgid:6160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbf9d84 r8:00000002 r7:60000013 r6:ecbf9d8c r5:8591d400 r4:8591d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f9000 r5:85881b8c r4:85881800 r4:851dd080 Exception stack(0xecbf9fb0 to 0xecbf9ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r5:85df1b8c r4:85df1800 r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 task:kworker/0:390 state:D stack:0 pid:6162 tgid:6162 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8591e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f66c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1fb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca1f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85881f8c r4:85881c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85881f8c r4:851dd180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591e000 r8:851dd1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851dd180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dd180 r8:8027ed34 r7:ecbf9e60 r6:851dd200 r5:8591e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f6400 INFO: task kworker/0:390:6162 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8f597000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:8591ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f1fd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca2b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588238c r4:85882000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588238c r4:851dd280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591ec00 r8:851dd2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851dd280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dd280 r8:8027ed34 r7:ecbfde60 r6:851dd300 r5:8591ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc01fb0 to 0xecc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f68c0 INFO: task kworker/0:391:6164 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:392:6166 blocked for more than 476 seconds. r5:85228000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r9:83018005 r8:85228000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ff000 r7:dddced40 r6:83018000 r5:8588278c r4:851dd380 Exception stack(0xecc05fb0 to 0xecc05ff8) INFO: task kworker/0:392:6166 is blocked on a mutex likely owned by task kworker/0:133:3790. 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r5:85df1b8c r4:85df1800 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:6168 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:6168 tgid:6168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc11d84 r8:00000002 r7:60000013 r6:ecc11d8c r5:8584a400 r4:8584a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8584a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8584a400 r7:00000000 r6:83018000 r5:00001000 r4:7f201000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca3d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85882b8c r4:85882800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85882b8c r4:851dd500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584a400 r8:851dd52c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dd500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dd500 r8:8027ed34 r7:ecc05e60 r6:8477f300 r5:8584a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f6980 INFO: task kworker/0:393:6168 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 8f90b000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:394 state:D stack:0 pid:6170 tgid:6170 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8584bc00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6c40 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:6172 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:6172 tgid:6172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc21d84 r8:00000002 r7:60000113 r6:ecc21d8c r5:8584c800 r4:8584c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8584c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc21e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d6480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8584c800 r7:00000000 r6:83018000 r5:00001000 r4:7f20f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588c78c r4:8588c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588c78c r4:851dd580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584c800 r8:851dd5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851dd580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dd580 r8:8027ed34 r7:ecc19e60 r6:8477f400 r5:8584c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc21fb0 to 0xecc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f6b80 INFO: task kworker/0:395:6172 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9001f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 r4:e05e5dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:6173 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:6173 tgid:6173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc25d84 r8:00000002 r7:60000113 r6:ecc25d8c r5:8584d400 r4:8584d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8584d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:851dd600 5fa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:397 state:D stack:0 pid:6175 tgid:6175 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8584b000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc2de08 r4:00000000 r5:8588378c r4:85883400 r4:851dd680 Exception stack(0xecc2dfb0 to 0xecc2dff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:6178 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:6178 tgid:6178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc39d84 r8:00000002 r7:60000113 r6:ecc39d8c r5:85848c00 r4:85848c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85848c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc39e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d6040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85848c00 r7:00000000 r6:83018000 r5:00001000 r4:7f209000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85883b8c r4:85883800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85883b8c r4:851dd700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85848c00 r8:851dd72c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dd700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dd700 r8:8027ed34 r7:ecc21e60 r6:8477f580 r5:85848c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc39fb0 to 0xecc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d6080 INFO: task kworker/0:398:6178 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9078f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:6179 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:6179 tgid:6179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc3dd84 r8:00000002 r7:60000113 r6:ecc3dd8c r5:85848000 r4:85848000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85848000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc3de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d61c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85848000 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca7f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85883f8c r4:85883c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85883f8c r4:851dd780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85848000 r8:851dd7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851dd780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dd780 r8:8027ed34 r7:ecc21e60 r6:8477f600 r5:85848000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc3dfb0 to 0xecc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d6080 INFO: task kworker/0:399:6179 is blocked on a mutex likely owned by task kworker/0:133:3790. r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:ed641000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85228c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:858d6400 Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:401 state:D stack:0 pid:6185 tgid:6185 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85229800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc41e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85229800 r8:851dd92c r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 90be3000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:6186 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:6186 tgid:6186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc0dd84 r8:00000002 r7:60000013 r6:ecc0dd8c r5:8522a400 r4:8522a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc0de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d6740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8522a400 r7:00000000 r6:83018000 r5:00001000 r4:7f213000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588cf8c r4:8588cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588cf8c r4:851dda00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522a400 r8:851dda2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851dda00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:403 state:D stack:0 pid:6188 tgid:6188 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8522b000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:851ddb00 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d6700 INFO: task kworker/0:403:6188 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 912b6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:6190 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:6190 tgid:6190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc55d84 r8:00000002 r7:60000013 r6:ecc55d8c r5:8522bc00 r4:8522bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc55e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d6a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8522bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f217000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc5d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588d78c r4:8588d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588d78c r4:851ddc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522bc00 r8:851ddc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ddc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ddc00 r8:8027ed34 r7:ecc49e60 r6:851ddc80 r5:8522bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc55fb0 to 0xecc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d6840 INFO: task kworker/0:404:6190 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:8522c800 r5:8522c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc69e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d6b80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8522c800 r7:00000000 r6:83018000 r5:00001000 r4:7f115000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588db8c r4:8588d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588db8c r4:851ddd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522c800 r8:851ddd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ddd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ddd00 r8:8027ed34 r7:ecc55e60 r6:851ddd80 r5:8522c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d6c00 INFO: task kworker/0:405:6195 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 913df000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:8522d400 r5:8522d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecc4dfb0 to 0xecc4dff8) r4:858d6c00 Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:407 state:D stack:0 pid:6197 tgid:6197 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8522e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bfc80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8522e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588eb8c r4:8588e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588eb8c r4:851ddf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522e000 r8:851ddf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ddf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ddf00 r8:8027ed34 r7:ecc4de60 r6:851ddf80 r5:8522e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf5fb0 to 0xecaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d6c00 INFO: task kworker/0:407:6197 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 91c3c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8522ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:858d6c00 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d20 to 0xe05e5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:6217 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:6217 tgid:6217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca59d84 r8:00000002 r7:60000113 r6:eca59d8c r5:84a68000 r4:84a68000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a68000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bfd00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a68000 r7:00000000 r6:83018000 r5:00001000 r4:7f1a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbcf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588ef8c r4:8588ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588ef8c r4:858bd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a68000 r8:858bd12c r7:82804d40 r6:dddced40 r5:dddced60 r4:858bd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bd100 r8:8027ed34 r7:ecb3de60 r6:858bd180 r5:84a68000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca59fb0 to 0xeca59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858bfdc0 INFO: task kworker/0:409:6217 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8584e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca95e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bfec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8584e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec49f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588f38c r4:8588f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8588f38c r4:858bd200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8584e000 r8:858bd22c r7:82804d40 r6:dddced40 r5:dddced60 r4:858bd200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bd200 r8:8027ed34 r7:ecb3de60 r6:8477f680 r5:8584e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca95fb0 to 0xeca95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858bfe00 INFO: task kworker/0:410:6218 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 92005000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:411:6220 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r5:84a6bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:82ac21e4 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a6d400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d3140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a6d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f2b8c r4:841f2800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f2b8c r4:858bd380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6d400 r8:858bd3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bd380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bd380 r8:8027ed34 r7:ecb3de60 r6:858bd400 r5:84a6d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab1fb0 to 0xecab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847af900 INFO: task kworker/0:412:6224 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 923fa000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:413:6226 blocked for more than 476 seconds. r4:84a6ec00 r5:84a6ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8588ff8c r4:8588fc00 r10:61c88647 r9:84a6ec00 r8:858bd4ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:6227 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:6227 tgid:6227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc31d84 r8:00000002 r7:60000113 r6:ecc31d8c r5:84a6c800 r4:84a6c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d32c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a6c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1b7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec805000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589c38c r4:8589c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589c38c r4:858bd580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6c800 r8:858bd5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bd580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bd580 r8:8027ed34 r7:ecab1e60 r6:858bd600 r5:84a6c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858bf3c0 INFO: task kworker/0:414:6227 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9286c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:6230 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:6230 tgid:6230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a6b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d35c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r4:00000000 r5:85df1b8c r4:85df1800 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:6233 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:6233 tgid:6233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc29d84 r8:00000002 r7:60000113 r6:ecc29d8c r5:84a6a400 r4:84a6a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc29e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d34c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a6a400 r7:00000000 r6:83018000 r5:00001000 r4:7f1b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec963000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589c78c r4:8589c400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589c78c r4:858bd780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6a400 r8:858bd7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bd780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bd780 r8:8027ed34 r7:ecc65e60 r6:858bd800 r5:84a6a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc29fb0 to 0xecc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d3480 INFO: task kworker/0:416:6233 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 92d32000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:84a69800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d38c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a69800 r7:00000000 r6:83018000 r5:00001000 r4:7f1bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589d38c r4:8589d000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589d38c r4:858bd880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a69800 r8:858bd8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bd880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bd880 r8:8027ed34 r7:ecc65e60 r6:858bd900 r5:84a69800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc95fb0 to 0xecc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d3540 INFO: task kworker/0:417:6234 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 92d32000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 INFO: task kworker/0:418:6237 blocked for more than 476 seconds. r5:84a68c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d37c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a68c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589cf8c r4:8589cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589cf8c r4:858bd980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a68c00 r8:858bd9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bd980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bd980 r8:8027ed34 r7:ecc95e60 r6:858bda00 r5:84a68c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc99fb0 to 0xecc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: 93533000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:419:6238 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:6238 tgid:6238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc9dd84 r8:00000002 r7:60000113 r6:ecc9dd8c r5:84a6e000 r4:84a6e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d3a80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a6e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589d78c r4:8589d400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589d78c r4:858bda80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6e000 r8:858bdaac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bda80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bda80 r8:8027ed34 r7:ecc95e60 r6:858bdb00 r5:84a6e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc9dfb0 to 0xecc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:858d3840 Workqueue: events bpf_prog_free_deferred 5d20: 93533000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85938000 r5:85938000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca1e08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: 93533000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:6242 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:6242 tgid:6242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecca5d84 r8:00000002 r7:60000013 r6:ecca5d8c r5:85938c00 r4:85938c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85938c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d3b40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85938c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1c3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca01000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589db8c r4:8589d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589db8c r4:858bdc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85938c00 r8:858bdcac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bdc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bdc80 r8:8027ed34 r7:ecca1e60 r6:858bdd00 r5:85938c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca5fb0 to 0xecca5ff8) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:6244 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecca9d84 r8:00000002 r7:60000113 r6:ecca9d8c r5:85939800 r4:85939800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85939800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858d3ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85939800 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca29000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589e38c r4:8589e000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589e38c r4:858bdd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85939800 r8:858bddac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bdd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bdd80 r8:8027ed34 r7:ecca1e60 r6:858bde00 r5:85939800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca9fb0 to 0xecca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858d3c80 INFO: task kworker/0:422:6244 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 93a04000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8593a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:858bde80 Exception stack(0xeccadfb0 to 0xeccadff8) r4:858c7000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:6248 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:6248 tgid:6248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccb1d84 r8:00000002 r7:60000113 r6:eccb1d8c r5:8593b000 r4:8593b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7240 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593b000 r7:00000000 r6:83018000 r5:00001000 r4:7f1cb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca43000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589eb8c r4:8589e800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589eb8c r4:858bdf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593b000 r8:858bdfac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bdf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bdf80 r8:8027ed34 r7:eccade60 r6:858be000 r5:8593b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb1fb0 to 0xeccb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7000 INFO: task kworker/0:424:6248 is blocked on a mutex likely owned by task kworker/0:133:3790. Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:425:6250 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:6250 tgid:6250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccb5d84 r8:00000002 r7:60000113 r6:eccb5d8c r5:8593bc00 r4:8593bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c73c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1cd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca63000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589ef8c r4:8589ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589ef8c r4:858be080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593bc00 r8:858be0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be080 r8:8027ed34 r7:eccb1e60 r6:858be100 r5:8593bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb5fb0 to 0xeccb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7200 INFO: task kworker/0:425:6250 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 94340000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:426 state:D stack:0 pid:6252 tgid:6252 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8593c800 r4:829187f0 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1d1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589f78c r4:8589f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589f78c r4:858be180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593c800 r8:858be1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be180 r8:8027ed34 r7:eccb5e60 r6:858be200 r5:8593c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb9fb0 to 0xeccb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7300 INFO: task kworker/0:426:6252 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 94340000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:6254 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:6254 tgid:6254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccbdd84 r8:00000002 r7:60000113 r6:eccbdd8c r5:8593d400 r4:8593d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8593d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccbde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8593d400 r7:00000000 r6:83018000 r5:00001000 r4:7f1cf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca77000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589f38c r4:8589f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589f38c r4:858be280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593d400 r8:858be2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be280 r8:8027ed34 r7:eccb9e60 r6:858be300 r5:8593d400 Exception stack(0xeccbdfb0 to 0xeccbdff8) r4:858c76c0 Workqueue: events bpf_prog_free_deferred 5d20: 94340000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r4:e05e5dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfc80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:850d6000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c78c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:858be380 r8:8027ed34 r7:eccb9e60 r6:8477f700 r5:850d6000 r4:858c7640 Workqueue: events bpf_prog_free_deferred 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:6258 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:6258 tgid:6258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccd1d84 r8:00000002 r7:60000113 r6:eccd1d8c r5:85849800 r4:85849800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85849800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85849800 r7:00000000 r6:83018000 r5:00001000 r4:7f1d3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589fb8c r4:8589f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8589fb8c r4:858be400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85849800 r8:858be42c r7:82804d40 r6:dddced40 r5:dddced60 r4:858be400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be400 r8:8027ed34 r7:ecccde60 r6:8477f780 r5:85849800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd1fb0 to 0xeccd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7780 INFO: task kworker/0:429:6258 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 94acb000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:8593ec00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ecaff000 r7:dddced40 r6:83018000 r5:855dc38c r4:858be480 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:6262 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:6262 tgid:6262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccc1d84 r8:00000002 r7:60000013 r6:eccc1d8c r5:850d5400 r4:850d5400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850d5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c7c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855dc78c r4:855dc400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855dc78c r4:858be580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d5400 r8:858be5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be580 r8:8027ed34 r7:eccc9e60 r6:858be600 r5:850d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7b00 INFO: task kworker/0:431:6262 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:432 state:D stack:0 pid:6263 tgid:6263 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852c0c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bf3c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855dcf8c r4:855dcc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855dcf8c r4:858be680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c0c00 r8:858be6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be680 r8:8027ed34 r7:eccc1e60 r6:858be700 r5:852c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc5fb0 to 0xeccc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7bc0 INFO: task kworker/0:432:6263 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 951b6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:6266 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:852c2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeccd9fb0 to 0xeccd9ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:434 state:D stack:0 pid:6269 tgid:6269 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852c3000 r4:829187f0 r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:855dd38c r4:855dd000 r4:858be880 Exception stack(0xecce1fb0 to 0xecce1ff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 95529000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:6272 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:6272 tgid:6272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccddd84 r8:00000002 r7:60000013 r6:eccddd8c r5:852c0000 r4:852c0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccdde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f1e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec881000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855de38c r4:855de000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855de38c r4:858be980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c0000 r8:858be9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858be980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858be980 r8:8027ed34 r7:ecce1e60 r6:858bea00 r5:852c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccddfb0 to 0xeccddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac040 INFO: task kworker/0:435:6272 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 957cb000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:436:6273 blocked for more than 476 seconds. r5:852c3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac140 r5:855dd78c r4:855dd400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855dd78c r4:858bea80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c3c00 r8:858beaac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bea80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bea80 r8:8027ed34 r7:eccdde60 r6:858beb00 r5:852c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd5fb0 to 0xeccd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac180 INFO: task kworker/0:436:6273 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 958c7000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:437 state:D stack:0 pid:6275 tgid:6275 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:852c5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac380 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f1e1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ddb8c r4:855dd800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ddb8c r4:858beb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c5400 r8:858bebac r7:82804d40 r6:dddced40 r5:dddced60 r4:858beb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858beb80 r8:8027ed34 r7:eccdde60 r6:858bec00 r5:852c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce9fb0 to 0xecce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac340 INFO: task kworker/0:437:6275 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 958c7000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:8593e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ddf8c r4:855ddc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ddf8c r4:858bec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593e000 r8:858becac r7:82804d40 r6:dddced40 r5:dddced60 r4:858bec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bec80 r8:8027ed34 r7:eccdde60 r6:8477f800 r5:8593e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccedfb0 to 0xeccedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac5c0 INFO: task kworker/0:438:6276 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 95b8f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:6281 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:6281 tgid:6281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:852c6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858acc00 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855def8c r4:855dec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855def8c r4:858bed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c6000 r8:858bed2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858bed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bed00 r8:8027ed34 r7:eccdde60 r6:858bed80 r5:852c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf1fb0 to 0xeccf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858ac880 INFO: task kworker/0:439:6281 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 95b8f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:6282 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:6282 tgid:6282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecce5d84 r8:00000002 r7:60000013 r6:ecce5d8c r5:852c6c00 r4:852c6c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c6c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858ac900 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1e9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:858acac0 5d20: 961b8000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:852c4800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852c4800 r8:858bef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858bef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858bef00 r8:8027ed34 r7:eccf1e60 r6:858bef80 r5:852c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf5fb0 to 0xeccf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858aca00 INFO: task kworker/0:441:6284 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 961b8000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:852c1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:852c1800 r8:84b2e02c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85940000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858acd80 r10:61c88647 r9:85940000 r8:84b2e12c r7:82804d40 r6:dddced40 r5:dddced60 Call trace: r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85940c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd01e08 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b17100 INFO: task kworker/0:444:6290 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 968f6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Call trace: r5:85941800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd05e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85943000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17740 r4:84b2e400 r4:84b17180 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 968f6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:6297 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:6297 tgid:6297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd19d84 r8:00000002 r7:60000113 r6:ecd19d8c r5:85944800 r4:85944800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85944800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd19e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17840 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85944800 r7:00000000 r6:83018000 r5:00001000 r4:7f1fd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc13000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550078c r4:85500400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550078c r4:84b2e500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85944800 r8:84b2e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2e500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2e500 r8:8027ed34 r7:ecd0de60 r6:84b2e580 r5:85944800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd19fb0 to 0xecd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b175c0 INFO: task kworker/0:447:6297 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 96c1c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:6301 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:6301 tgid:6301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd15d84 r8:00000002 r7:60000113 r6:ecd15d8c r5:85942400 r4:85942400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85942400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd15e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85942400 r7:00000000 r6:83018000 r5:00001000 r4:7f201000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc43000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85942400 r8:84b2e62c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Workqueue: events bpf_prog_free_deferred r5:85945400 r4:829187f0 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85945400 r7:00000000 r6:83018000 r5:00001000 r4:7f1ff000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc1d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85500b8c r4:85500800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85500b8c r4:84b2e780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85945400 r8:84b2e7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2e780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2e780 r8:8027ed34 r7:ecd15e60 r6:84b2e800 r5:85945400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd09fb0 to 0xecd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b178c0 INFO: task kworker/0:449:6302 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800f0013 ffffffff r4:00000000 r5:85df1b8c r4:85df1800 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Workqueue: events bpf_prog_free_deferred r5:85946000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b17a00 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 r5:85df1b8c r4:85df1800 Exception stack(0xe05e5fb0 to 0xe05e5ff8) task:kworker/0:451 state:D stack:0 pid:6306 tgid:6306 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85946c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd1de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b17e40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85946c00 r7:00000000 r6:83018000 r5:00001000 r4:7f205000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc5f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550178c r4:85501400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550178c r4:84b2e900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85946c00 r8:84b2e92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2e900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2e900 r8:8027ed34 r7:ecd11e60 r6:84b2e980 r5:85946c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd1dfb0 to 0xecd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b17b40 INFO: task kworker/0:451:6306 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85943c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r4:00000001 r4:84bbf4c0 Call trace: r5:85851800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85850000 r4:829187f0 r4:00000000 r9:83018005 r8:85850000 r7:00000000 r6:83018000 r5:00001000 r4:7f209000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd2d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85501f8c r4:85501c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85501f8c r4:84b2eb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85850000 r8:84b2ebac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2eb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2eb80 r8:8027ed34 r7:ecd35e60 r6:8477f900 r5:85850000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd4dfb0 to 0xecd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086280 INFO: task kworker/0:454:6312 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d20: 97eda000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85852400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85852400 r7:00000000 r6:83018000 r5:00001000 r4:7f20b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd3f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550238c r4:85502000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550238c r4:84b2ec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85852400 r8:84b2ec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2ec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2ec00 r8:8027ed34 r7:ecd35e60 r6:8477f980 r5:85852400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 800f0013 ffffffff r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:852d0000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850863c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f20f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd57000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550278c r4:85502400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8550278c r4:84b2ec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d0000 r8:84b2ecac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2ec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2ec80 r8:8027ed34 r7:ecd35e60 r6:84b2ed00 r5:852d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd31fb0 to 0xecd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbf4c0 r4:852d1800 r5:852d1800 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:852d4800 r4:829187f0 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f1bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9f9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858eff8c r4:858efc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858eff8c r4:84b2ee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d4800 r8:84b2eeac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b2ee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2ee80 r8:8027ed34 r7:ecd35e60 r6:84b2ef00 r5:852d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd81fb0 to 0xecd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85086bc0 INFO: task kworker/0:458:6328 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:852d3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f600 r4:00000001 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:852d5400 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecd95fb0 to 0xecd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b2f900 INFO: task kworker/0:460:6380 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9890f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:6425 blocked for more than 477 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:852d6c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852d6c00 r8:858b71ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7180 r8:8027ed34 r7:ecd35e60 r6:858b7200 r5:852d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec919fb0 to 0xec919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462740 INFO: task kworker/0:461:6425 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d20 to 0xe05e5d68) r4:82ac21e4 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfc80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:852d6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462cc0 r5:8595078c r4:85950400 r10:61c88647 r9:852d6000 r8:858b72ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: 98cd1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:6429 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:6429 tgid:6429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8d1d84 r8:00000002 r7:60000013 r6:ec8d1d8c r5:852d2400 r4:852d2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462ac0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f273000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec925000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595038c r4:85950000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595038c r4:858b7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d2400 r8:858b73ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7380 r8:8027ed34 r7:ec929e60 r6:858b7400 r5:852d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d1fb0 to 0xec8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462980 INFO: task kworker/0:463:6429 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 99085000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:464:6432 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:6432 tgid:6432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec931d84 r8:00000002 r7:60000113 r6:ec931d8c r5:852d3000 r4:852d3000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462f40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f279000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb25000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85950f8c r4:85950c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85950f8c r4:858b7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d3000 r8:858b74ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7480 r8:8027ed34 r7:ec929e60 r6:858b7500 r5:852d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec931fb0 to 0xec931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462c80 INFO: task kworker/0:464:6432 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9951a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:6434 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:6434 tgid:6434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec945d84 r8:00000002 r7:60000113 r6:ec945d8c r5:852d0c00 r4:852d0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852d0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f277000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec941000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85950b8c r4:85950800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85950b8c r4:858b7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852d0c00 r8:858b75ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7580 r8:8027ed34 r7:ec931e60 r6:858b7600 r5:852d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec945fb0 to 0xec945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462d40 INFO: task kworker/0:465:6434 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9951a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:6436 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:6436 tgid:6436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8e9d84 r8:00000002 r7:60000013 r6:ec8e9d8c r5:85980000 r4:85980000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85980000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847aff40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85980000 r7:00000000 r6:83018000 r5:00001000 r4:7f27b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb629000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595138c r4:85951000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595138c r4:858b7680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85980000 r8:858b76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7680 r8:8027ed34 r7:ec931e60 r6:858b7700 r5:85980000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e9fb0 to 0xec8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858c7d40 INFO: task kworker/0:466:6436 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9951a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:6438 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:6438 tgid:6438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec985d84 r8:00000002 r7:60000013 r6:ec985d8c r5:85980c00 r4:85980c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85980c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec985e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854622c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85980c00 r7:00000000 r6:83018000 r5:00001000 r4:7f27d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4d5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595178c r4:85951400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595178c r4:858b7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85980c00 r8:858b77ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7780 r8:8027ed34 r7:ec8e9e60 r6:858b7800 r5:85980c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec985fb0 to 0xec985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462440 INFO: task kworker/0:467:6438 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 999b1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:6440 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:6440 tgid:6440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec989d84 r8:00000002 r7:60000013 r6:ec989d8c r5:85981800 r4:85981800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85981800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854591c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85981800 r7:00000000 r6:83018000 r5:00001000 r4:7f283000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec761000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595238c r4:85952000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595238c r4:858b7880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85981800 r8:858b78ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7880 r8:8027ed34 r7:ec985e60 r6:858b7900 r5:85981800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851d4a00 INFO: task kworker/0:468:6440 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 999b1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:6442 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:6442 tgid:6442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec939d84 r8:00000002 r7:60000113 r6:ec939d8c r5:85982400 r4:85982400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85982400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec939e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d4f00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85982400 r7:00000000 r6:83018000 r5:00001000 r4:7f27f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85951b8c r4:85951800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85951b8c r4:858b7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85982400 r8:858b79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7980 r8:8027ed34 r7:ec989e60 r6:858b7a00 r5:85982400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec939fb0 to 0xec939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85462100 INFO: task kworker/0:469:6442 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 99d7d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:6443 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:6443 tgid:6443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec98dd84 r8:00000002 r7:60000113 r6:ec98dd8c r5:85983000 r4:85983000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85983000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec98de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85983000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec751000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85951f8c r4:85951c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85951f8c r4:858b7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85983000 r8:858b7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7a80 r8:8027ed34 r7:ec989e60 r6:858b7b00 r5:85983000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec98dfb0 to 0xec98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459180 INFO: task kworker/0:470:6443 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a1bd000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:6446 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:6446 tgid:6446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec995d84 r8:00000002 r7:60000113 r6:ec995d8c r5:85983c00 r4:85983c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85983c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459280 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85983c00 r7:00000000 r6:83018000 r5:00001000 r4:7f285000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7ad000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595278c r4:85952400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595278c r4:858b7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85983c00 r8:858b7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7b80 r8:8027ed34 r7:ec989e60 r6:858b7c00 r5:85983c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec995fb0 to 0xec995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459100 INFO: task kworker/0:471:6446 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a48c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:6448 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:6448 tgid:6448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec991d84 r8:00000002 r7:60000013 r6:ec991d8c r5:85984800 r4:85984800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85984800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec991e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854594c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85984800 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7bf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85952b8c r4:85952800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85952b8c r4:858b7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85984800 r8:858b7cac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7c80 r8:8027ed34 r7:ec995e60 r6:858b7d00 r5:85984800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec991fb0 to 0xec991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854592c0 INFO: task kworker/0:472:6448 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a59a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:6451 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:473 state:D stack:0 pid:6451 tgid:6451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec999d84 r8:00000002 r7:60000013 r6:ec999d8c r5:85985400 r4:85985400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85985400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec999e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85985400 r7:00000000 r6:83018000 r5:00001000 r4:7f28b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7fb000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595338c r4:85953000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595338c r4:858b7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85985400 r8:858b7dac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7d80 r8:8027ed34 r7:ec991e60 r6:858b7e00 r5:85985400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec999fb0 to 0xec999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459480 INFO: task kworker/0:473:6451 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a59a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:6452 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:6452 tgid:6452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9a1d84 r8:00000002 r7:60000013 r6:ec9a1d8c r5:85986000 r4:85986000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85986000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85986000 r7:00000000 r6:83018000 r5:00001000 r4:7f289000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7df000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85952f8c r4:85952c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85952f8c r4:858b7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85986000 r8:858b7eac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7e80 r8:8027ed34 r7:ec999e60 r6:858b7f00 r5:85986000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a1fb0 to 0xec9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854595c0 INFO: task kworker/0:474:6452 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9a93c000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:6455 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:6455 tgid:6455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9a5d84 r8:00000002 r7:60000113 r6:ec9a5d8c r5:85986c00 r4:85986c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85986c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85986c00 r7:00000000 r6:83018000 r5:00001000 r4:7f28d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec813000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595378c r4:85953400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595378c r4:858b7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85986c00 r8:858b7fac r7:82804d40 r6:dddced40 r5:dddced60 r4:858b7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858b7f80 r8:8027ed34 r7:ec999e60 r6:851f5000 r5:85986c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a5fb0 to 0xec9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854596c0 INFO: task kworker/0:475:6455 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:476:6457 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:6457 tgid:6457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9add84 r8:00000002 r7:60000113 r6:ec9add8c r5:84998000 r4:84998000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84998000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854599c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84998000 r7:00000000 r6:83018000 r5:00001000 r4:7f28f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec837000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85953b8c r4:85953800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85953b8c r4:851f5080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84998000 r8:851f50ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5080 r8:8027ed34 r7:ec9a5e60 r6:851f5100 r5:84998000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9adfb0 to 0xec9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459800 INFO: task kworker/0:476:6457 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ed641000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:6458 tgid:6458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec99dd84 r8:00000002 r7:60000113 r6:ec99dd8c r5:84998c00 r4:84998c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84998c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459800 INFO: task kworker/0:477:6458 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9acb7000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:6460 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:6460 tgid:6460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9b1d84 r8:00000002 r7:60000113 r6:ec9b1d8c r5:84999800 r4:84999800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84999800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8595838c r4:851f5280 r10:61c88647 r9:84999800 r8:851f52ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xec9b1fb0 to 0xec9b1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:6463 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:6463 tgid:6463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9bdd84 r8:00000002 r7:60000013 r6:ec9bdd8c r5:8499a400 r4:8499a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b1780 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499a400 r7:00000000 r6:83018000 r5:00001000 r4:7f295000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec887000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595878c r4:85958400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595878c r4:851f5380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499a400 r8:851f53ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5380 r8:8027ed34 r7:ec9b1e60 r6:851f5400 r5:8499a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85459d40 INFO: task kworker/0:479:6463 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9afb1000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:6464 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:6464 tgid:6464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece29d84 r8:00000002 r7:60000013 r6:ece29d8c r5:85850c00 r4:85850c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85850c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece29e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85850c00 r7:00000000 r6:83018000 r5:00001000 r4:7f297000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85958b8c r4:85958800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85958b8c r4:851f5480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85850c00 r8:851f54ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5480 r8:8027ed34 r7:ec9bde60 r6:8477fa00 r5:85850c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece29fb0 to 0xece29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa080 INFO: task kworker/0:480:6464 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9b94d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:6467 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:6467 tgid:6467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece61d84 r8:00000002 r7:60000013 r6:ece61d8c r5:85856000 r4:85856000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85856000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece61e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa180 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85856000 r7:00000000 r6:83018000 r5:00001000 r4:7f299000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85958f8c r4:85958c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85958f8c r4:851f5500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85856000 r8:851f552c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5500 r8:8027ed34 r7:ece29e60 r6:8477fa80 r5:85856000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece61fb0 to 0xece61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa2c0 INFO: task kworker/0:481:6467 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9b94d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:6468 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:6468 tgid:6468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece65d84 r8:00000002 r7:60000113 r6:ece65d8c r5:85853c00 r4:85853c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85853c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece65e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f29f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8db000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85959b8c r4:85959800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85959b8c r4:851f5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85853c00 r8:851f55ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5580 r8:8027ed34 r7:ece61e60 r6:8477fb00 r5:85853c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece65fb0 to 0xece65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa2c0 INFO: task kworker/0:482:6468 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9bc7a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:6469 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:6469 tgid:6469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9cdd84 r8:00000002 r7:60000113 r6:ec9cdd8c r5:8499b000 r4:8499b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9cde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499b000 r7:00000000 r6:83018000 r5:00001000 r4:7f29b000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c1000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595938c r4:85959000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595938c r4:851f5600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499b000 r8:851f562c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5600 r8:8027ed34 r7:ece65e60 r6:851f5680 r5:8499b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9cdfb0 to 0xec9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa2c0 INFO: task kworker/0:483:6469 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9bc7a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:6472 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:6472 tgid:6472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece69d84 r8:00000002 r7:60000113 r6:ece69d8c r5:8499bc00 r4:8499bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece69e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f29d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d3000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595978c r4:85959400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595978c r4:851f5700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499bc00 r8:851f572c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5700 r8:8027ed34 r7:ece65e60 r6:851f5780 r5:8499bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece69fb0 to 0xece69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa300 INFO: task kworker/0:484:6472 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9c0ae000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:6475 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:6475 tgid:6475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece6dd84 r8:00000002 r7:60000113 r6:ece6dd8c r5:8499c800 r4:8499c800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece6de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa740 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499c800 r7:00000000 r6:83018000 r5:00001000 r4:7f2a1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec907000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85959f8c r4:85959c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85959f8c r4:851f5800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499c800 r8:851f582c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5800 r8:8027ed34 r7:ece65e60 r6:851f5880 r5:8499c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece6dfb0 to 0xece6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa580 INFO: task kworker/0:485:6475 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9c6d6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:6476 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:6476 tgid:6476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece71d84 r8:00000002 r7:60000113 r6:ece71d8c r5:8499d400 r4:8499d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece71e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fabc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499d400 r7:00000000 r6:83018000 r5:00001000 r4:7f2a7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595ab8c r4:8595a800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595ab8c r4:851f5900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8499d400 r8:851f592c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5900 r8:8027ed34 r7:ece6de60 r6:851f5980 r5:8499d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece71fb0 to 0xece71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa580 INFO: task kworker/0:486:6476 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9c6d6000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:6478 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:6478 tgid:6478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece75d84 r8:00000002 r7:60000113 r6:ece75d8c r5:8499e000 r4:8499e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece75e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa580 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec913000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8595a38c r4:8595a000 r10:61c88647 r9:8499e000 r8:851f5a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa900 INFO: task kworker/0:487:6478 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9c8e2000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:6481 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:6481 tgid:6481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece79d84 r8:00000002 r7:60000113 r6:ece79d8c r5:8499ec00 r4:8499ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8499ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece79e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fa9c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8499ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f2a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec921000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595a78c r4:8595a400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595a78c r4:851f5b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fad00 INFO: task kworker/0:488:6481 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9ce09000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:6482 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:6482 tgid:6482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece7dd84 r8:00000002 r7:60000113 r6:ece7dd8c r5:85988000 r4:85988000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85988000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece7de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fad80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85988000 r7:00000000 r6:83018000 r5:00001000 r4:7f2a9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595af8c r4:8595ac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595af8c r4:851f5c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85988000 r8:851f5c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5c00 r8:8027ed34 r7:ece71e60 r6:851f5c80 r5:85988000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece7dfb0 to 0xece7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d20: 9ce09000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:6485 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:6485 tgid:6485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece81d84 r8:00000002 r7:60000113 r6:ece81d8c r5:85988c00 r4:85988c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85988c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece81e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85459e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85988c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec97d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595b38c r4:8595b000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595b38c r4:851f5d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85988c00 r8:851f5d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5d00 r8:8027ed34 r7:ece7de60 r6:851f5d80 r5:85988c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece81fb0 to 0xece81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fad40 INFO: task kworker/0:490:6485 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9d274000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece85e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05e5d20 to 0xe05e5d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec9c9d84 r8:00000002 r7:60000013 r6:ec9c9d8c r5:8598b000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0140 r5:8595bb8c r4:8595b800 r10:61c88647 r9:8598b000 r8:851f5f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851f5f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5f00 r8:8027ed34 r7:ece85e60 r6:851f5f80 r5:8598b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c9fb0 to 0xec9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b0240 INFO: task kworker/0:492:6488 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9d653000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:6490 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:6490 tgid:6490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece8dd84 r8:00000002 r7:60000013 r6:ece8dd8c r5:8598bc00 r4:8598bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8598bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece8de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b03c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8598bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8595bf8c r4:8595bc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8595bf8c r4:858a8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8598bc00 r8:858a802c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8000 r8:8027ed34 r7:ec9c9e60 r6:858a8080 r5:8598bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece8dfb0 to 0xece8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b0100 INFO: task kworker/0:493:6490 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9da34000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:6492 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:6492 tgid:6492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece91d84 r8:00000002 r7:60000013 r6:ece91d8c r5:8598d400 r4:8598d400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8598d400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece91e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8598d400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca21000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596438c r4:85964000 r7:dddced40 r6:83018000 r5:8596438c r4:858a8100 r4:00000001 Exception stack(0xece91fb0 to 0xece91ff8) r4:858b0380 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8598c800 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:6499 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece89d84 r8:00000002 r7:60000113 r6:ece89d8c r5:8598e000 r4:8598e000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8598e000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8598e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca31000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596478c r4:85964400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596478c r4:858a8300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8598e000 r8:858a832c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8300 r8:8027ed34 r7:ece9de60 r6:858a8380 r5:8598e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece89fb0 to 0xece89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:497 state:D stack:0 pid:6501 tgid:6501 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8598ec00 r8:858a842c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:6502 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:6502 tgid:6502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecea5d84 r8:00000002 r7:60000113 r6:ecea5d8c r5:8598a400 r4:8598a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8598a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8598a400 r7:00000000 r6:83018000 r5:00001000 r4:7f2c5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca81000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596578c r4:85965400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596578c r4:858a8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8598a400 r8:858a852c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8500 r8:8027ed34 r7:ece95e60 r6:858a8580 r5:8598a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea5fb0 to 0xecea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:e05e5dc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:6505 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:6505 tgid:6505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecea9d84 r8:00000002 r7:60000013 r6:ecea9d8c r5:853a9800 r4:853a9800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a9800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b0ec0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f2c1000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca69000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8596538c r4:85965000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8596538c r4:858a8600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a9800 r8:858a862c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8600 r8:8027ed34 r7:ecea5e60 r6:858a8680 r5:853a9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 r5:00001000 r4:ed641000 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:6508 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:6508 tgid:6508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eceb1d84 r8:00000002 r7:60000113 r6:eceb1d8c r5:85853000 r4:85853000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85853000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85853000 r7:00000000 r6:83018000 r5:00001000 r4:7f2c7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca8f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85965b8c r4:85965800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85965b8c r4:858a8700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800f0013 ffffffff r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:501 state:D stack:0 pid:6510 tgid:6510 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2400 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:858a8780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: 9eeaf000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:6512 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:6512 tgid:6512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecec1d84 r8:00000002 r7:60000013 r6:ecec1d8c r5:85855400 r4:85855400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85855400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2300 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85855400 r7:00000000 r6:83018000 r5:00001000 r4:7f2c9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca99000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85965f8c r4:85965c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85965f8c r4:858a8800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85855400 r8:858a882c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8800 r8:8027ed34 r7:eceb9e60 r6:8477fc80 r5:85855400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec1fb0 to 0xecec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858b22c0 INFO: task kworker/0:502:6512 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d20 to 0xe05e5d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb9a1000 r7:dddced40 r6:83018000 r5:8596678c r4:858a8880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe05e5d20 to 0xe05e5d68) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:6520 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:6520 tgid:6520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eceadd84 r8:00000002 r7:60000113 r6:eceadd8c r5:853a8c00 r4:853a8c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a8c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545e540 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f311000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf75000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85966b8c r4:85966800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85966b8c r4:858a8900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a8c00 r8:858a892c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeceadfb0 to 0xeceadff8) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:6536 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:6536 tgid:6536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecee1d84 r8:00000002 r7:60000113 r6:ecee1d8c r5:853abc00 r4:853abc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853abc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545e480 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f30f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f378c r4:855f3400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84bbf4c0 task:kworker/0:506 state:D stack:0 pid:6559 tgid:6559 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: 9f9b9000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:6562 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:6562 tgid:6562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf89d84 r8:00000002 r7:60000113 r6:ecf89d8c r5:853ae000 r4:853ae000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ae000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf89e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848af080 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f45d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfdf000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:841f878c r4:841f8400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:841f878c r4:858a8c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ae000 r8:858a8c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8c00 r8:8027ed34 r7:ecf6de60 r6:858a8c80 r5:853ae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf89fb0 to 0xecf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545e600 INFO: task kworker/0:507:6562 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a00d5000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e05e5dc0 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:6800 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:6800 tgid:6800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed101d84 r8:00000002 r7:60000013 r6:ed101d8c r5:853a8000 r4:853a8000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a8000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed101e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79440 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f465000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:853ac800 r4:829187f0 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:853ac800 r8:858a8e2c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:6804 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:6804 tgid:6804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed1a1d84 r8:00000002 r7:60000013 r6:ed1a1d8c r5:853ad400 r4:853ad400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853ad400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f463000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0a7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849cf38c r4:849cf000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:849cf38c r4:858a8f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ad400 r8:858a8f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8f00 r8:8027ed34 r7:ed101e60 r6:858a8f80 r5:853ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1a1fb0 to 0xed1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a79580 INFO: task kworker/0:510:6804 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a0963000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:ed641000 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 Not tainted 6.15.0-syzkaller #0 r5:853aec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f467000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0c5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9c38c r4:85a9c000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9c38c r4:85a72000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853aec00 r8:85a7202c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72000 r8:8027ed34 r7:ed101e60 r6:85a72080 r5:853aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2bdfb0 to 0xed2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a793c0 INFO: task kworker/0:511:6806 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a1238000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:6808 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:6808 tgid:6808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:853ab000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79940 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f46d000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9cb8c r4:85a9c800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9cb8c r4:85a72100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ab000 r8:85a7212c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72100 r8:8027ed34 r7:ed2bde60 r6:85a72180 r5:853ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c1fb0 to 0xed2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a793c0 INFO: task kworker/0:512:6808 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a1238000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85858000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85a72200 Exception stack(0xed1f1fb0 to 0xed1f1ff8) 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85858c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85858c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a79a00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85858c00 r7:00000000 r6:83018000 r5:00001000 r4:7f46f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed10b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9cf8c r4:85a9cc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9cf8c r4:85a72300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85858c00 r8:85a7232c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85859800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed2cdfb0 to 0xed2cdff8) r4:85a798c0 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:6817 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:6817 tgid:6817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2d1d84 r8:00000002 r7:60000113 r6:ed2d1d8c r5:8585a400 r4:8585a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8585a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a79c40 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:517:6820 blocked for more than 478 seconds. r5:8585b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:6821 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:6821 tgid:6821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2d9d84 r8:00000002 r7:60000113 r6:ed2d9d8c r5:8585bc00 r4:8585bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8585bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2d9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858aa1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8585bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f475000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed13b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9db8c r4:85a9d800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9db8c r4:85a72700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85a72700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72700 r8:8027ed34 r7:ed2d5e60 r6:85a72780 r5:8585bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2d9fb0 to 0xed2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a79e80 INFO: task kworker/0:518:6821 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a2bff000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:519 state:D stack:0 pid:6823 tgid:6823 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8585c800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85a72800 r8:8027ed34 r7:ed2d5e60 r6:85a72880 r5:8585c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:520 state:D stack:0 pid:6825 tgid:6825 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8585d400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2e1e08 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e5dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:521 state:D stack:0 pid:6828 tgid:6828 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8585e000 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9eb8c r4:85a72a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8585e000 r8:85a72a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72a00 r8:8027ed34 r7:ed2e1e60 r6:85a72a80 r5:8585e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2e5fb0 to 0xed2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a61300 INFO: task kworker/0:521:6828 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a337e000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:6829 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:6829 tgid:6829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2e9d84 r8:00000002 r7:60000113 r6:ed2e9d8c r5:8585ec00 r4:8585ec00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8585ec00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2e9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8585ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f47f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed183000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9ef8c r4:85a9ec00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9ef8c r4:85a72b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85a72b00 Exception stack(0xed2e9fb0 to 0xed2e9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e5dc0 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:6831 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:6831 tgid:6831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2c9d84 r8:00000002 r7:60000113 r6:ed2c9d8c r5:855c0c00 r4:855c0c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c0c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61e80 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f489000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1db000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9ff8c r4:85a9fc00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9ff8c r4:85a72c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0c00 r8:85a72c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72c00 r8:8027ed34 r7:ed2e9e60 r6:85a72c80 r5:855c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c9fb0 to 0xed2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a61600 INFO: task kworker/0:523:6831 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a390d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:855c2400 r5:855c2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f1e08 [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a9f38c r4:85a9f000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a72d00 r10:00000000 r9:85a72d00 r8:8027ed34 r7:ed2c9e60 r6:85a72d80 r5:855c2400 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:6834 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:6834 tgid:6834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2f5d84 r8:00000002 r7:60000113 r6:ed2f5d8c r5:855c0000 r4:855c0000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c0000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61c40 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f485000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1bd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9f78c r4:85a9f400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9f78c r4:85a72e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0000 r8:85a72e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72e00 r8:8027ed34 r7:ed2c9e60 r6:85a72e80 r5:855c0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f5fb0 to 0xed2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a61780 INFO: task kworker/0:525:6834 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a3e5f000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:6838 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:6838 tgid:6838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2f9d84 r8:00000002 r7:60000113 r6:ed2f9d8c r5:855c1800 r4:855c1800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c1800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a61cc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f487000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1c9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a9fb8c r4:85a9f800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a9fb8c r4:85a72f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c1800 r8:85a72f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a72f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72f00 r8:8027ed34 r7:ed2c9e60 r6:85a72f80 r5:855c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2f9fb0 to 0xed2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a616c0 INFO: task kworker/0:526:6838 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a436d000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:6840 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:6840 tgid:6840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed2fdd84 r8:00000002 r7:60000013 r6:ed2fdd8c r5:855c3c00 r4:855c3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2fde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a69c00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f48b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a61dc0 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:6842 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:6842 tgid:6842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed301d84 r8:00000002 r7:60000113 r6:ed301d8c r5:855c4800 r4:855c4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed301e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f48f000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed30d000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa8b8c r4:85aa8800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aa8b8c r4:85a54100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a4b600 INFO: task kworker/0:528:6842 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a4af5000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855c5400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85a54200 r8:8027ed34 r7:ed301e60 r6:85a54280 r5:855c5400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:6846 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:6846 tgid:6846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed311d84 r8:00000002 r7:60000013 r6:ed311d8c r5:855c6000 r4:855c6000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855c6000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed311e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e1c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f491000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed31b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa8f8c r4:85aa8c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aa8f8c r4:85a54300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c6000 r8:85a5432c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54300 r8:8027ed34 r7:ed301e60 r6:85a54380 r5:855c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed311fb0 to 0xed311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e240 INFO: task kworker/0:530:6846 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5153000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 r5:800f0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r5:85df1b8c r4:85df1800 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 task:kworker/0:531 state:D stack:0 pid:6848 tgid:6848 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855c6c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed319e08 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:855c6c00 r8:85a5442c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d60: 800f0013 ffffffff r4:e05e5dc0 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855c3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed325e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e700 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:855c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f497000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed335000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa9b8c r4:85aa9800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aa9b8c r4:85a54500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c3000 r8:85a5452c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54500 r8:8027ed34 r7:ed319e60 r6:85a54580 r5:855c3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed325fb0 to 0xed325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e380 INFO: task kworker/0:532:6850 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5266000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ed32dd84 r8:00000002 r7:60000113 r6:ed32dd8c r5:85700000 r5:85700000 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ed641000 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:534 state:D stack:0 pid:6854 tgid:6854 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85700c00 r4:829187f0 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4e800 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85700c00 r7:00000000 r6:83018000 r5:00001000 r4:7f499000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed343000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aa9f8c r4:85aa9c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aa9f8c r4:85a54700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85700c00 r8:85a5472c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54700 r8:8027ed34 r7:ed325e60 r6:85a54780 r5:85700c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed339fb0 to 0xed339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e6c0 INFO: task kworker/0:534:6854 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5a49000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:535 state:D stack:0 pid:6857 tgid:6857 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85701800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5d8e000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85702400 r5:85702400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aaaf8c r4:85aaac00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aaaf8c r4:85a54900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85702400 r8:85a5492c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54900 r8:8027ed34 r7:ed341e60 r6:85a54980 r5:85702400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed355fb0 to 0xed355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e8c0 INFO: task kworker/0:536:6859 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5d8e000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:84bbf4c0 Workqueue: events bpf_prog_free_deferred r5:85703000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85aaa78c r4:85aaa400 r10:61c88647 r9:85703000 r8:85a54a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54a00 r8:8027ed34 r7:ed355e60 r6:85a54a80 r5:85703000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2edfb0 to 0xed2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4e8c0 INFO: task kworker/0:537:6860 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a5d8e000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85703c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4ecc0 r5:85aaab8c r4:85aaa800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85704800 r4:829187f0 r4:00000000 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aab78c r4:85aab400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aab78c r4:85a54b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85704800 r8:85a54b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54b00 r8:8027ed34 r7:ed355e60 r6:85a54c80 r5:85704800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed361fb0 to 0xed361ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a4ed40 INFO: task kworker/0:539:6864 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a6915000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:540 state:D stack:0 pid:6866 tgid:6866 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85705400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85a54d00 r8:8027ed34 r7:ed361e60 r6:85a54d80 r5:85705400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84bdfc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:541:6868 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:541 state:D stack:0 pid:6868 tgid:6868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed37dd84 r8:00000002 r7:60000113 r6:ed37dd8c r5:853a4800 r4:853a4800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a4800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed37de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35340 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f4a5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb37000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85aabb8c r4:85aab800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85aabb8c r4:85a54e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853a4800 r8:85a54e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a54e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a54e00 r8:8027ed34 r7:ed361e60 r6:8477fd80 r5:853a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed37dfb0 to 0xed37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35180 INFO: task kworker/0:541:6868 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r5:85df1b8c r4:85df1800 r4:84bdfc80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:542:6870 blocked for more than 479 seconds. r4:853a0c00 r5:853a0c00 r4:829187f0 [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:853a0c00 r8:85a54eac r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35280 INFO: task kworker/0:542:6870 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a7019000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:6871 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:6871 tgid:6871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed389d84 r8:00000002 r7:60000013 r6:ed389d8c r5:853a3c00 r4:853a3c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a3c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed389e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35180 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85a54f00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853a3000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed391e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35680 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f4ab000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca71000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab478c r4:85ab4400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab478c r4:85a54f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85a54f80 r8:8027ed34 r7:ed385e60 r6:8477ff00 r5:853a3000 5d60: 800f0013 ffffffff r5:85df1b8c r4:85df1800 r4:84bbf4c0 r5:853a1800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35b00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:6877 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:6877 tgid:6877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3a1d84 r8:00000002 r7:60000013 r6:ed3a1d8c r5:853a2400 r4:853a2400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853a2400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35880 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85ab4b8c r4:85ab4800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 INFO: task kworker/0:547:6879 blocked for more than 479 seconds. r4:00000000 r5:85ab4f8c r4:85ab4c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e05e5dc0 r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:6882 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:6882 tgid:6882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3a9d84 r8:00000002 r7:60000113 r6:ed3a9d8c r5:85706c00 r4:85706c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85706c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35bc0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85706c00 r7:00000000 r6:83018000 r5:00001000 r4:7f4b3000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc5000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab578c r4:85ab5400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab578c r4:85a2b200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85706c00 r8:85a2b22c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b200 r8:8027ed34 r7:ed39de60 r6:85a2b280 r5:85706c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a9fb0 to 0xed3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35c40 INFO: task kworker/0:548:6882 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a806a000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:6885 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:6885 tgid:6885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3add84 r8:00000002 r7:60000113 r6:ed3add8c r5:84928000 r4:84928000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84928000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3ade08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a35d00 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84928000 r7:00000000 r6:83018000 r5:00001000 r4:7f4b5000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece09000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab5b8c r4:85ab5800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab5b8c r4:85a2b300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84928000 r8:85a2b32c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b300 r8:8027ed34 r7:ed3a9e60 r6:85a2b380 r5:84928000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3adfb0 to 0xed3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35c40 INFO: task kworker/0:549:6885 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8472000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:6886 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:6886 tgid:6886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3b1d84 r8:00000002 r7:60000113 r6:ed3b1d8c r5:84928c00 r4:84928c00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84928c00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b1e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b140 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84928c00 r7:00000000 r6:83018000 r5:00001000 r4:7f4b9000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecec9000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab638c r4:85ab6000 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab638c r4:85a2b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84928c00 r8:85a2b42c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b400 r8:8027ed34 r7:ed3ade60 r6:85a2b480 r5:84928c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b1fb0 to 0xed3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a35d40 INFO: task kworker/0:550:6886 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8512000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:6889 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:6889 tgid:6889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3b5d84 r8:00000002 r7:60000113 r6:ed3b5d8c r5:84929800 r4:84929800 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84929800 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b5e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b040 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84929800 r7:00000000 r6:83018000 r5:00001000 r4:7f4b7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece4b000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab5f8c r4:85ab5c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab5f8c r4:85a2b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84929800 r8:85a2b52c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b500 r8:8027ed34 r7:ed3b1e60 r6:85a2b580 r5:84929800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b5fb0 to 0xed3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a1b280 INFO: task kworker/0:551:6889 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8512000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:6890 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:6890 tgid:6890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed36dd84 r8:00000002 r7:60000113 r6:ed36dd8c r5:8492a400 r4:8492a400 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492a400 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed36de08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b3c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f4bb000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1fd000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab678c r4:85ab6400 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab678c r4:85a2b600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492a400 r8:85a2b62c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b600 r8:8027ed34 r7:ed3b1e60 r6:85a2b680 r5:8492a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed36dfb0 to 0xed36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a1b100 INFO: task kworker/0:552:6890 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8e38000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:6891 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:6891 tgid:6891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3b9d84 r8:00000002 r7:60000113 r6:ed3b9d8c r5:8492b000 r4:8492b000 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492b000 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b9e08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b4c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492b000 r7:00000000 r6:83018000 r5:00001000 r4:7f4bd000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed225000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab6b8c r4:85ab6800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab6b8c r4:85a2b700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492b000 r8:85a2b72c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b700 r8:8027ed34 r7:ed36de60 r6:85a2b780 r5:8492b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b9fb0 to 0xed3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a1b100 INFO: task kworker/0:553:6891 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8fc9000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85df1b8c r4:85df1800 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85df1b8c r4:84bdfc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84450c00 r8:84bdfcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bdfc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdfc80 r8:8027ed34 r7:e05dde60 r6:84bdfd00 r5:84450c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bbf4c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:554:6894 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:6894 tgid:6894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a68ca0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a67d18>] (__schedule) from [<81a68ca0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed3bdd84 r8:00000002 r7:60000113 r6:ed3bdd8c r5:8492bc00 r4:8492bc00 [<81a68c74>] (schedule) from [<81a69088>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492bc00 r4:829187f0 [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a69070>] (schedule_preempt_disabled) from [<81a6b76c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6b46c>] (__mutex_lock.constprop.0) from [<81a6bc38>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3bde08 r4:00000000 [<81a6bc24>] (__mutex_lock_slowpath) from [<81a6bc78>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6bc3c>] (mutex_lock) from [<804e4ed4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1b640 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f4bf000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed22f000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7054>] (bpf_jit_free) from [<803c814c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab6f8c r4:85ab6c00 [<803c8000>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab6f8c r4:85a2b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492bc00 r8:85a2b82c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a2b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a2b800 r8:8027ed34 r7:ed3b9e60 r6:85a2b880 r5:8492bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3bdfb0 to 0xed3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a1b440 INFO: task kworker/0:554:6894 is blocked on a mutex likely owned by task kworker/0:133:3790. task:kworker/0:133 state:R running task stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a67d18>] (__schedule) from [<81a690d4>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:84450c00 r8:80200be4 r7:e05e5d54 r6:ffffffff r5:84450c00 r4:00000000 [<81a69094>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d20 to 0xe05e5d68) 5d20: a8fc9000 e00e1000 00000001 80239bb8 7f5e5000 00000001 82ac21c4 82ac15a0 5d40: 7f5e5000 e00e1000 8280c9b4 e05e5d9c e05e5da0 e05e5d70 80230af4 80239bd0 5d60: 800f0013 ffffffff r5:800f0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4c98>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac21e4 [<804e4a14>] (__purge_vmap_area_lazy) from [<804e5050>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4e6c>] (_vm_unmap_aliases) from [<804e8dc4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df7c0 r4:00000000 [<804e8c58>] (vfree) from [<80549f1c>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e7000 [<80549eec>] (execmem_free) from [<803c6cdc>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed641000 [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ccc>] (bpf_jit_free_exec) from [<803c70bc>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)