Extracting prog: 6m56.216907761s Minimizing prog: 1h51m43.643917845s Simplifying prog options: 0s Extracting C: 8m38.034850711s Simplifying C: 58m31.458686623s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2, 0x2, 0x0, @void, @value}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2, 0x2, 0x0, @void, @value}, 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 4 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h5m49.35439627s repro crashed as (corrupted=false): INFO: task kworker/1:2:1609 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:1609 tgid:1609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:8382ec00 r4:8382ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8382ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551e340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8382ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc41000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b34b8c r4:85b34800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b34b8c r4:84275780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8382ec00 r8:842757ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84275780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84275780 r8:8027ecf4 r7:df879e60 r6:84275800 r5:8382ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8419d980 INFO: task kworker/1:2:1609 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 INFO: task kworker/1:1:3092 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3092 tgid:3092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9e5d84 r8:00000002 r7:60000013 r6:df9e5d8c r5:84098000 r4:84098000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84098000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551edc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84098000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb77000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3638c r4:85b36000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b3638c r4:84d64880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84098000 r8:84d648ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d64880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d64880 r8:8027ecf4 r7:df879e60 r6:84dfe280 r5:84098000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847a6a80 INFO: task kworker/1:1:3092 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 INFO: task kworker/0:4:3140 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa25d84 r8:00000002 r7:60000013 r6:dfa25d8c r5:8382c800 r4:8382c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8382c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85192640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8382c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0687000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558cf8c r4:8558cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8558cf8c r4:84dfe480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8382c800 r8:84dfe4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfe480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfe480 r8:8027ecf4 r7:df845e60 r6:830cd300 r5:8382c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84796500 INFO: task kworker/0:4:3140 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 INFO: task kworker/0:6:3155 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa8dd84 r8:00000002 r7:60000113 r6:dfa8dd8c r5:83d90000 r4:83d90000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83d90000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85192d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83d90000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558d38c r4:8558d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8558d38c r4:84dfe580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83d90000 r8:84dfe5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfe580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfe580 r8:8027ecf4 r7:dfa25e60 r6:84dfe680 r5:83d90000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84796a80 INFO: task kworker/0:6:3155 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 INFO: task kworker/1:20:3156 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:83d90c00 r4:83d90c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83d90c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551e480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83d90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b34f8c r4:85b34c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b34f8c r4:84d44380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83d90c00 r8:84d443ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d44380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d44380 r8:8027ecf4 r7:dfa81e60 r6:84dfe700 r5:83d90c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844fdcc0 INFO: task kworker/1:20:3156 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 INFO: task kworker/0:7:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:8415e000 r4:8415e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8415e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85113200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8415e000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa89000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566678c r4:85666400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8566678c r4:84dfe780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8415e000 r8:84dfe7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfe780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfe780 r8:8027ecf4 r7:dfa25e60 r6:84dfe800 r5:8415e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84796cc0 INFO: task kworker/0:7:3158 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 INFO: task kworker/0:8:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:832e9800 r4:832e9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832e9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850576c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba35000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e1f78c r4:84e1f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e1f78c r4:84dfe880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e9800 r8:84dfe8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfe880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfe880 r8:8027ecf4 r7:dfab5e60 r6:84d44400 r5:832e9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84796e80 INFO: task kworker/0:8:3160 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 INFO: task kworker/0:9:3162 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:83a51800 r4:83a51800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a51800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1d940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a51800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e1ff8c r4:84e1fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e1ff8c r4:84dfe900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a51800 r8:84dfe92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfe900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfe900 r8:8027ecf4 r7:dfad1e60 r6:84d44480 r5:83a51800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84796040 INFO: task kworker/0:9:3162 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 INFO: task kworker/0:10:3163 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:840ab000 r4:840ab000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840ab000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2438c r4:84e24000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2438c r4:84dfe980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ab000 r8:84dfe9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfe980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfe980 r8:8027ecf4 r7:dfae9e60 r6:84d44500 r5:840ab000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e0f380 INFO: task kworker/0:10:3163 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 INFO: task kworker/0:11:3165 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83a53c00 r4:83a53c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a53c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a53c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb991000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2478c r4:84e24400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2478c r4:84dfea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a53c00 r8:84dfea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfea00 r8:8027ecf4 r7:dfae9e60 r6:84d44580 r5:83a53c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:844fdd80 INFO: task kworker/0:11:3165 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3167 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:844ca400 r4:844ca400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844ca400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:844fdd00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e1fb8c r4:84e1f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e1fb8c r4:84dfea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ca400 r8:84dfeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfea80 r8:8027ecf4 r7:dfafde60 r6:84d44600 r5:844ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84796380 INFO: task kworker/0:12:3167 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3170 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:844cec00 r4:844cec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844cec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850b57c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0821000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bcf8c r4:856bcc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856bcf8c r4:84dfeb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cec00 r8:84dfeb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfeb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfeb00 r8:8027ecf4 r7:dfafde60 r6:84d44680 r5:844cec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e071c0 INFO: task kworker/0:13:3170 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3173 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:844cb000 r4:844cb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844cb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85927d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb91f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b238c r4:858b2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b238c r4:84dfeb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cb000 r8:84dfebac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfeb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfeb80 r8:8027ecf4 r7:dfb29e60 r6:84d44700 r5:844cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07100 INFO: task kworker/0:14:3173 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3174 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:844cc800 r4:844cc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844cc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85140980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0881000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850a1f8c r4:850a1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850a1f8c r4:84dfec00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cc800 r8:84dfec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfec00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfec00 r8:8027ecf4 r7:dfb3de60 r6:84d44780 r5:844cc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07100 INFO: task kworker/0:15:3174 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3175 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:844cbc00 r4:844cbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844cbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548a5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2538c r4:84e25000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2538c r4:84dfec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cbc00 r8:84dfecac r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfec80 r8:8027ecf4 r7:dfb3de60 r6:84d44800 r5:844cbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07200 INFO: task kworker/0:16:3175 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3177 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfac1d84 r8:00000002 r7:60000113 r6:dfac1d8c r5:83240c00 r4:83240c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83240c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a4240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb453000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b138c r4:858b1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b138c r4:84dfed00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240c00 r8:84dfed2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfed00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfed00 r8:8027ecf4 r7:dfb3de60 r6:84dfed80 r5:83240c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07440 INFO: task kworker/0:17:3177 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3180 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:83ac3000 r4:83ac3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f64700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b178c r4:858b1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b178c r4:84dfee00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac3000 r8:84dfee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfee00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfee00 r8:8027ecf4 r7:dfb3de60 r6:84dfee80 r5:83ac3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07640 INFO: task kworker/0:18:3180 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3181 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:83ac4800 r4:83ac4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad68c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac4800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b0738c r4:85b07000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b0738c r4:84dfef00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac4800 r8:84dfef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfef00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfef00 r8:8027ecf4 r7:dfb3de60 r6:84dfef80 r5:83ac4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07640 INFO: task kworker/0:19:3181 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3183 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:83ac1800 r4:83ac1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85997a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaeb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b2b8c r4:858b2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b2b8c r4:84dfe600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac1800 r8:84dfe62c r7:82804d40 r6:dddced40 r5:dddced60 r4:84dfe600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84dfe600 r8:8027ecf4 r7:dfb69e60 r6:83864180 r5:83ac1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07740 INFO: task kworker/0:20:3183 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3186 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:83ac3c00 r4:83ac3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ecbc00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ac3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc35000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2678c r4:84e26400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2678c r4:83864100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac3c00 r8:8386412c r7:82804d40 r6:dddced40 r5:dddced60 r4:83864100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83864100 r8:8027ecf4 r7:dfb69e60 r6:830b8480 r5:83ac3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07b40 INFO: task kworker/0:21:3186 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3188 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:83842400 r4:83842400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83842400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e94ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83842400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc21000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859b178c r4:859b1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859b178c r4:830b8400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83842400 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ecf4 r7:dfb69e60 r6:830b8780 r5:83842400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07b40 INFO: task kworker/0:22:3188 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3189 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:83840c00 r4:83840c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83840c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85091780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83840c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1cb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859b0f8c r4:859b0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859b0f8c r4:830b8700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83840c00 r8:830b872c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8700 r8:8027ecf4 r7:dfb8de60 r6:830b8680 r5:83840c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84e07f00 INFO: task kworker/0:23:3189 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3192 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:84c90000 r4:84c90000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c90000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ea3100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c90000 r7:00000000 r6:83018000 r5:00001000 r4:7f149000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2cb8c r4:84e2c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2cb8c r4:830b8580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c90000 r8:830b85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8580 r8:8027ecf4 r7:dfb8de60 r6:84453200 r5:84c90000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434000 INFO: task kworker/0:24:3192 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3193 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:84c90c00 r4:84c90c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c90c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859b1f8c r4:859b1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859b1f8c r4:84453880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c90c00 r8:844538ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84453880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84453880 r8:8027ecf4 r7:dfb99e60 r6:84df5000 r5:84c90c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434000 INFO: task kworker/0:25:3193 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3196 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:84c91800 r4:84c91800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c91800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7a4c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c91800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed021000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b4778c r4:85b47400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b4778c r4:84df5080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c91800 r8:84df50ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5080 r8:8027ecf4 r7:dfb99e60 r6:84df5100 r5:84c91800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434200 INFO: task kworker/0:26:3196 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3197 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:84c92400 r4:84c92400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c92400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c92400 r7:00000000 r6:83018000 r5:00001000 r4:7f147000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecebd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2cf8c r4:84e2cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2cf8c r4:84df5180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c92400 r8:84df51ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5180 r8:8027ecf4 r7:dfb99e60 r6:84df5200 r5:84c92400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434200 INFO: task kworker/0:27:3197 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3200 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbd5d84 r8:00000002 r7:60000013 r6:dfbd5d8c r5:84c93000 r4:84c93000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c93000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c93000 r7:00000000 r6:83018000 r5:00001000 r4:7f12b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c2d38c r4:85c2d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c2d38c r4:84df5280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c93000 r8:84df52ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5280 r8:8027ecf4 r7:dfbc9e60 r6:84df5300 r5:84c93000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434500 INFO: task kworker/0:28:3200 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3201 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:844cd400 r4:844cd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844cd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ea3240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f145000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece51000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2d38c r4:84e2d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2d38c r4:84df5380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cd400 r8:84df53ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5380 r8:8027ecf4 r7:dfbd5e60 r6:84d44880 r5:844cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434500 INFO: task kworker/0:29:3201 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3202 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:840a8000 r4:840a8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840a8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ea3540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f143000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecda3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2d78c r4:84e2d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2d78c r4:84df5400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840a8000 r8:84df542c r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5400 r8:8027ecf4 r7:dfbd5e60 r6:84d44900 r5:840a8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434740 INFO: task kworker/0:30:3202 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3206 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:84dc9800 r4:84dc9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dc9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ea36c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dc9800 r7:00000000 r6:83018000 r5:00001000 r4:7f141000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2e38c r4:84e2e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2e38c r4:84df5500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dc9800 r8:84df552c r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5500 r8:8027ecf4 r7:dfbd5e60 r6:84d44980 r5:84dc9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434980 INFO: task kworker/0:31:3206 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3207 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:84dc8000 r4:84dc8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dc8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ea3600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dc8000 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb77000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2e78c r4:84e2e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2e78c r4:84df5580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dc8000 r8:84df55ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5580 r8:8027ecf4 r7:dfbd5e60 r6:84d44a00 r5:84dc8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434880 INFO: task kworker/0:32:3207 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3209 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84dc8c00 r4:84dc8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dc8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dc8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2eb8c r4:84e2e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2eb8c r4:84df5600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dc8c00 r8:84df562c r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5600 r8:8027ecf4 r7:dfbd5e60 r6:84d44a80 r5:84dc8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434a40 INFO: task kworker/0:33:3209 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3211 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc31d84 r8:00000002 r7:60000013 r6:dfc31d8c r5:84dcbc00 r4:84dcbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dcbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dcbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f131000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2ff8c r4:84e2fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2ff8c r4:84df5680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dcbc00 r8:84df56ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5680 r8:8027ecf4 r7:dfbd5e60 r6:84d44b00 r5:84dcbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc31fb0 to 0xdfc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434c00 INFO: task kworker/0:34:3211 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3213 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:84dcb000 r4:84dcb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dcb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dcb000 r7:00000000 r6:83018000 r5:00001000 r4:7f135000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2fb8c r4:84e2f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2fb8c r4:84df5700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dcb000 r8:84df572c r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5700 r8:8027ecf4 r7:dfc31e60 r6:84d44b80 r5:84dcb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434f00 INFO: task kworker/0:35:3213 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3215 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:84dcd400 r4:84dcd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dcd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859215c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dcd400 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec995000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2df8c r4:84e2dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2df8c r4:84df5780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dcd400 r8:84df57ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5780 r8:8027ecf4 r7:dfc31e60 r6:84d44c00 r5:84dcd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc49fb0 to 0xdfc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84434dc0 INFO: task kworker/0:36:3215 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3217 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:84dcc800 r4:84dcc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dcc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dcc800 r7:00000000 r6:83018000 r5:00001000 r4:7f139000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec743000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2f38c r4:84e2f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2f38c r4:84df5800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dcc800 r8:84df582c r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5800 r8:8027ecf4 r7:dfc31e60 r6:84d44c80 r5:84dcc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847933c0 INFO: task kworker/0:37:3217 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3219 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:84dca400 r4:84dca400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dca400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dca400 r7:00000000 r6:83018000 r5:00001000 r4:7f137000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebda9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2f78c r4:84e2f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2f78c r4:84df5880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dca400 r8:84df58ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5880 r8:8027ecf4 r7:dfc31e60 r6:84d44d00 r5:84dca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84793f40 INFO: task kworker/0:38:3219 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<8029358c>] (preempt_count_sub) from [<81a66f80>] (preempt_schedule_irq+0x4c/0xa8 kernel/sched/core.c:7106) [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: cfa15000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3221 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:84dce000 r4:84dce000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dce000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dce000 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df967000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b47f8c r4:85b47c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b47f8c r4:84df5900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dce000 r8:84df592c r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5900 r8:8027ecf4 r7:dfc31e60 r6:84d44d80 r5:84dce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea3040 INFO: task kworker/0:39:3221 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d3c2a000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3223 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc69d84 r8:00000002 r7:60000013 r6:dfc69d8c r5:84dd0c00 r4:84dd0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dd0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dd0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f133000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2ef8c r4:84e2ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2ef8c r4:84df5980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dd0c00 r8:84df59ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5980 r8:8027ecf4 r7:dfc31e60 r6:84d44e00 r5:84dd0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea3140 INFO: task kworker/0:40:3223 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d3c2a000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc75d84 r8:00000002 r7:60000113 r6:dfc75d8c r5:84dd0000 r4:84dd0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dd0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dd0000 r7:00000000 r6:83018000 r5:00001000 r4:7f125000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb867000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c2d78c r4:85c2d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c2d78c r4:84df5a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dd0000 r8:84df5a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5a00 r8:8027ecf4 r7:dfc31e60 r6:84d44e80 r5:84dd0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea3280 INFO: task kworker/0:41:3226 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d418c000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3227 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc79d84 r8:00000002 r7:60000013 r6:dfc79d8c r5:84dd1800 r4:84dd1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dd1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dd1800 r7:00000000 r6:83018000 r5:00001000 r4:7f12f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e2db8c r4:84e2d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e2db8c r4:84df5a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dd1800 r8:84df5aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5a80 r8:8027ecf4 r7:dfc75e60 r6:84d44f00 r5:84dd1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea3280 INFO: task kworker/0:42:3227 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d418c000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3230 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc71d84 r8:00000002 r7:60000013 r6:dfc71d8c r5:84c95400 r4:84c95400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c95400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ae8780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c95400 r7:00000000 r6:83018000 r5:00001000 r4:7f1f9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed68b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ad338c r4:85ad3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ad338c r4:84df5b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c95400 r8:84df5b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5b00 r8:8027ecf4 r7:dfc75e60 r6:84df5b80 r5:84c95400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea35c0 INFO: task kworker/0:43:3230 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d4785000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:84c96000 r4:84c96000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c96000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f4e0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c96000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df847000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3f78c r4:85c3f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85c3f78c r4:84df5c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c96000 r8:84df5c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5c00 r8:8027ecf4 r7:dfc71e60 r6:84df5c80 r5:84c96000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea35c0 INFO: task kworker/0:44:3231 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d4b0b000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3234 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:84c96c00 r4:84c96c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c96c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551e680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84c96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfcd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b3538c r4:85b35000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b3538c r4:84d44f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c96c00 r8:84d44fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84d44f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d44f80 r8:8027ecf4 r7:dfa81e60 r6:84df5d00 r5:84c96c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea0ec0 INFO: task kworker/1:21:3234 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d4e65000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3236 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc8dd84 r8:00000002 r7:60000113 r6:dfc8dd8c r5:84c93c00 r4:84c93c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c93c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f4ecc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed439000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b53b8c r4:85b53800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b53b8c r4:84df5d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c93c00 r8:84df5dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5d80 r8:8027ecf4 r7:dfc71e60 r6:84df5e00 r5:84c93c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc8dfb0 to 0xdfc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea3c80 INFO: task kworker/0:45:3236 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d51cb000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:84c78000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ed36b000 r10:61c88647 r9:84c78000 r8:84df5eac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 800f0013 ffffffff r4:eb5bddc0 r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84dd2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596c040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dd2400 r7:00000000 r6:83018000 r5:00001000 r4:7f287000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed89f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b66f8c r4:85b66c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b66f8c r4:84df5f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dd2400 r8:84df5fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84df5f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84df5f80 r8:8027ecf4 r7:dfc91e60 r6:84dfe180 r5:84dd2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea3dc0 INFO: task kworker/0:47:3239 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84dd5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:48:3244 is blocked on a mutex likely owned by task kworker/1:280:5002. r4:eb5bddc0 r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3246 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcadd84 r8:00000002 r7:60000113 r6:dfcadd8c r5:84dd6000 r4:84dd6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dd6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eabac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dd6000 r7:00000000 r6:83018000 r5:00001000 r4:7f3ff000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed291000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b73b8c r4:85b73800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b73b8c r4:84eae080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 800f0013 ffffffff r4:eb5bddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3247 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84dd3c00 r4:84dd3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dd3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c93900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dd3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f351000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed43b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7238c r4:85b72000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84dd3c00 r8:84eae12c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3249 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84dd4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eb5bddc0 r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:52 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84dd6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc4f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dd6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f447000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaf9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ce0b8c r4:85ce0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ce0b8c r4:84eae200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dd6c00 r8:84eae22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae200 r8:8027ecf4 r7:dfcade60 r6:84eb0200 r5:84dd6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84eab500 INFO: task kworker/0:52:3251 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d7ccc000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84dcec00 r5:84dcec00 r4:829189bc r4:00000000 r5:85b3578c r4:85b35400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3254 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfce9d84 r8:00000002 r7:60000113 r6:dfce9d8c r5:84dd3000 r4:84dd3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dd3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b73f8c r4:85b73c00 r7:dddced40 r6:83018000 r5:85b73f8c r4:84eae280 r4:84eae280 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:eb5bddc0 r4:00000000 r5:85989b8c r4:85989800 r4:8547de00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:54 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84dd8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d95b8c r4:85d95800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d95b8c r4:84eae300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dd8c00 r8:84eae32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae300 r8:8027ecf4 r7:dfcade60 r6:84eb0400 r5:84dd8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcfdfb0 to 0xdfcfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84eab940 INFO: task kworker/0:54:3256 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d84d2000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3258 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:84dda400 r4:84dda400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dda400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca2c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dda400 r7:00000000 r6:83018000 r5:00001000 r4:7f3fd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed129000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7378c r4:85b73400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b7378c r4:84eae380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dda400 r8:84eae3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae380 r8:8027ecf4 r7:dfcfde60 r6:84eb0480 r5:84dda400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84eab800 INFO: task kworker/0:55:3258 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d897b000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:56 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84c78c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca2000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c78c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3f5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7338c r4:85b73000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b7338c r4:84eae400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c78c00 r8:84eae42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae400 r8:8027ecf4 r7:dfcfde60 r6:84eae480 r5:84c78c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84eaba40 INFO: task kworker/0:56:3260 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d8cc2000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:57 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84c7a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eab500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c7a400 r7:00000000 r6:83018000 r5:00001000 r4:7f43b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda13000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3378c r4:84e33400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3378c r4:84eae500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7a400 r8:84eae52c r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae500 r8:8027ecf4 r7:dfcfde60 r6:84eae580 r5:84c7a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd11fb0 to 0xdfd11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84eabb40 INFO: task kworker/0:57:3262 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d8cc2000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3265 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd31d84 r8:00000002 r7:60000113 r6:dfd31d8c r5:84c7b000 r4:84c7b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ea0a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f3fd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae73000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e33b8c r4:84e33800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e33b8c r4:84eae600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7b000 r8:84eae62c r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfd31fb0 to 0xdfd31ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3267 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3267 tgid:3267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc81d84 r8:00000002 r7:60000113 r6:dfc81d8c r5:84dd9800 r4:84dd9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dd9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ea80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84dd9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed18d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b35f8c r4:85b35c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b35f8c r4:84eb0500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dd9800 r8:84eb052c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84eb0500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0500 r8:8027ecf4 r7:dfa81e60 r6:84eb0580 r5:84dd9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebc440 INFO: task kworker/1:23:3267 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d9b79000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r4:84ddb000 r5:84ddb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e33f8c r4:84e33c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e33f8c r4:84eae700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ddb000 r8:84eae72c r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae700 r8:8027ecf4 r7:dfcfde60 r6:84eb0600 r5:84ddb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd3dfb0 to 0xdfd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ea0100 INFO: task kworker/0:59:3268 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d9b79000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3270 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:84ddc800 r4:84ddc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ddc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd4de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851af040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ddc800 r7:00000000 r6:83018000 r5:00001000 r4:7f4c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed317000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cf138c r4:85cf1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cf138c r4:84eae780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ddc800 r8:84eae7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae780 r8:8027ecf4 r7:dfcfde60 r6:84eb0680 r5:84ddc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd4dfb0 to 0xdfd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebf080 INFO: task kworker/0:60:3270 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: d9ecb000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3272 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd65d84 r8:00000002 r7:60000113 r6:dfd65d8c r5:84ddbc00 r4:84ddbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ddbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad7840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ddbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f519000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda63000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e32b8c r4:84e32800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e32b8c r4:84eae800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ddbc00 r8:84eae82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae800 r8:8027ecf4 r7:dfcfde60 r6:84eb0700 r5:84ddbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd65fb0 to 0xdfd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebf280 INFO: task kworker/0:61:3272 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: da3b4000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:62:3275 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:62 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd79d84 r8:00000002 r7:60000113 r6:dfd79d8c r5:84ddd400 r4:84ddd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ddd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad9480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ddd400 r7:00000000 r6:83018000 r5:00001000 r4:7f561000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3238c r4:84e32000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3238c r4:84eae880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ddd400 r8:84eae8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae880 r8:8027ecf4 r7:dfcfde60 r6:84eb0780 r5:84ddd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd79fb0 to 0xdfd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebf240 INFO: task kworker/0:62:3275 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: da826000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3277 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:3277 tgid:3277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd85d84 r8:00000002 r7:60000113 r6:dfd85d8c r5:84dde000 r4:84dde000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dde000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd85e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad9c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dde000 r7:00000000 r6:83018000 r5:00001000 r4:7f51b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed84d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e31f8c r4:84e31c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e31f8c r4:84eae900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dde000 r8:84eae92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae900 r8:8027ecf4 r7:dfcfde60 r6:84eb0800 r5:84dde000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd85fb0 to 0xdfd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebf440 INFO: task kworker/0:63:3277 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: dad5e000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:64:3278 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:64 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd89d84 r8:00000002 r7:60000113 r6:dfd89d8c r5:84dd8000 r4:84dd8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84dd8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd89e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505bd00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84dd8000 r7:00000000 r6:83018000 r5:00001000 r4:7f631000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8bf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3978c r4:84e39400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3978c r4:84eae980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84dd8000 r8:84eae9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84eae980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eae980 r8:8027ecf4 r7:dfcfde60 r6:84eb0880 r5:84dd8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd89fb0 to 0xdfd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebf440 INFO: task kworker/0:64:3278 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: db343000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3281 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:3281 tgid:3281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd9dd84 r8:00000002 r7:60000013 r6:dfd9dd8c r5:84ddec00 r4:84ddec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ddec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505bc00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ddec00 r7:00000000 r6:83018000 r5:00001000 r4:7f62f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed815000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e39b8c r4:84e39800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e39b8c r4:84eaea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ddec00 r8:84eaea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84eaea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eaea00 r8:8027ecf4 r7:dfd89e60 r6:84eb0900 r5:84ddec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd9dfb0 to 0xdfd9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebf7c0 INFO: task kworker/0:65:3281 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: dbb6a000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:3283 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfda9d84 r8:00000002 r7:60000113 r6:dfda9d8c r5:84c94800 r4:84c94800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c94800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d8edc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c94800 r7:00000000 r6:83018000 r5:00001000 r4:7f649000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dbbf8c r4:85dbbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85dbbf8c r4:84eaea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c94800 r8:84eaeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84eaea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eaea80 r8:8027ecf4 r7:dfd9de60 r6:84eb0980 r5:84c94800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda9fb0 to 0xdfda9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebf4c0 INFO: task kworker/0:66:3283 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: dbb6a000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8547de00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84de0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:eb5bddc0 r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r5:84de0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505b9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84de0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f62b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3a38c r4:84e3a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3a38c r4:84eaeb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84de0c00 r8:84eaebac r7:82804d40 r6:dddced40 r5:dddced60 r4:84eaeb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eaeb80 r8:8027ecf4 r7:dfda9e60 r6:84eb0a80 r5:84de0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdc1fb0 to 0xdfdc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebfb00 INFO: task kworker/0:68:3287 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r5:00001000 r4:ed5db000 r4:00000001 task:kworker/0:69 state:D stack:0 pid:3288 tgid:3288 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84de1800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd69e08 r10:61c88647 r9:84de1800 r8:84eaec2c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r4:eb5bddc0 r5:85989b8c r4:85989800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84de2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505b680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84de2400 r7:00000000 r6:83018000 r5:00001000 r4:7f7cb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0d3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e1e38c r4:85e1e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85e1e38c r4:84eaec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84de2400 r8:84eaecac r7:82804d40 r6:dddced40 r5:dddced60 r4:84eaec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) Call trace: r4:eb5bddc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:71 state:D stack:0 pid:3294 tgid:3294 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84de3000 r4:829189bc r4:00000000 r5:00001000 r4:edf97000 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:eb5bddc0 r5:85989b8c r4:85989800 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:72 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:84de3c00 r4:84de3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84de3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85992bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84de3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f6d9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee077000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3678c r4:85d36400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d3678c r4:84eaed80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84de3c00 r8:84eaedac r7:82804d40 r6:dddced40 r5:dddced60 r4:84eaed80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eaed80 r8:8027ecf4 r7:dfabde60 r6:84eb0c80 r5:84de3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84c79800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:84c79800 r8:84eaee2c r7:82804d40 r6:dddced40 r5:dddced60 Call trace: r4:eb5bddc0 r5:85989b8c r4:85989800 dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3299 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:3299 tgid:3299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfd49d84 r8:00000002 r7:60000113 r6:dfd49d8c r5:84c7c800 r4:84c7c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84c7c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd3180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c7c800 r7:00000000 r6:83018000 r5:00001000 r4:7f733000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee2ff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d36b8c r4:85d36800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d36b8c r4:84eaef00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdfd49fb0 to 0xdfd49ff8) Exception stack(0xeb5bdd20 to 0xeb5bdd68) r5:00001000 r4:ed5db000 r4:00000001 task:kworker/0:75 state:D stack:0 pid:3301 tgid:3301 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84c7e000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596e440 r9:83018005 r8:84c7e000 r7:00000000 r6:83018000 r5:00001000 r4:7f7af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eddd5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d37f8c r4:85d37c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d37f8c r4:84ec6000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7e000 r8:84ec602c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ec6000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec6000 r8:8027ecf4 r7:dfd25e60 r6:84ec6080 r5:84c7e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 r4:8547de00 INFO: task kworker/0:76:3305 blocked for more than 452 seconds. r5:84c7ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:84c7ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7a7000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r5:00001000 r4:ed5db000 r4:00000001 task:kworker/0:77 state:D stack:0 pid:3307 tgid:3307 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84c7d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596efc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84c7d400 r7:00000000 r6:83018000 r5:00001000 r4:7f7a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda57000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3738c r4:85d37000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d3738c r4:84ec6200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84c7d400 r8:84ec622c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ec6200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec6200 r8:8027ecf4 r7:dfb01e60 r6:84ec6280 r5:84c7d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:eb5bddc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:78 state:D stack:0 pid:3308 tgid:3308 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84c7bc00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:84c7bc00 r8:84ec632c r7:82804d40 r6:dddced40 r5:dddced60 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:8547de00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:844c8000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7bb80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f91f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc35000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3e78c r4:84e3e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3e78c r4:84ec6400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c8000 r8:84ec642c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ec6400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec6400 r8:8027ecf4 r7:dfb19e60 r6:84ec6480 r5:844c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ec0a80 INFO: task kworker/0:79:3310 is blocked on a mutex likely owned by task kworker/1:280:5002. Workqueue: events bpf_prog_free_deferred r4:eb5bddc0 r5:85989b8c r4:85989800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:80 state:D stack:0 pid:3311 tgid:3311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:84ca0000 r4:84ca0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ca0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r5:00001000 r4:ed8dd000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000000 r4:eb5bddc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:24 state:D stack:0 pid:3314 tgid:3314 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84de5400 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:84eb0d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84eb0d00 r8:8027ecf4 r7:dfa81e60 r6:84eb0d80 r5:84de5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84eca4c0 INFO: task kworker/1:24:3314 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: de7af000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:85989b8c r4:85989800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84de4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d19040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84de4800 r7:00000000 r6:83018000 r5:00001000 r4:7f921000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed893000 r10:61c88647 r9:84de4800 r8:84ec662c r7:82804d40 r6:dddced40 r5:dddced60 dd60: 800f0013 ffffffff [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r5:84ed8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r7:dddced40 r6:83018000 r5:84e3f78c r4:84ec6680 Call trace: [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: df01d000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 r4:853f26c0 r5:84ed9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r7:dddced40 r6:83018000 r5:84e3eb8c r4:84ec6700 task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85989b8c r4:85989800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:84:3321 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:3321 tgid:3321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:84eda400 r4:84eda400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84eda400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) INFO: task kworker/0:85:3323 blocked for more than 452 seconds. r5:84edbc00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad9900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84edbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f8cf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:00000000 r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:86 state:D stack:0 pid:3325 tgid:3325 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84edb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ed8000 r5:84ed8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:61c88647 r9:84ed8000 r8:84ec692c r7:82804d40 r6:dddced40 r5:dddced60 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r5:84edc800 r4:829189bc r4:00000000 r5:00001000 r4:ed649000 Exception stack(0xdfdf9fb0 to 0xdfdf9ff8) [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:3332 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:3332 tgid:3332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfe11d84 r8:00000002 r7:60000113 r6:dfe11d8c r5:84ede000 r4:84ede000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ede000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ed16c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ede000 r7:00000000 r6:83018000 r5:00001000 r4:7f91b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84e3ff8c r4:84e3fc00 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:8547de00 r4:853f26c0 r5:84edec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad93c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84edec00 r7:00000000 r6:83018000 r5:00001000 r4:7f8c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3fb8c r4:84e3f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3fb8c r4:84ec6a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84edec00 r8:84ec6aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ec6a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec6a80 r8:8027ecf4 r7:dfe11e60 r6:84f15280 r5:84edec00 Exception stack(0xdfe15fb0 to 0xdfe15ff8) r4:00000000 r4:eb5bddc0 r5:85989b8c r4:85989800 Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:3336 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:3336 tgid:3336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:84edd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:91:3336 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:84de6000 r5:84de6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:eb5bddc0 r5:85989b8c r4:85989800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:93:3340 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:93 state:D stack:0 pid:3340 tgid:3340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfe45d84 r8:00000002 r7:60000113 r6:dfe45d8c r5:84ee0000 r4:84ee0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ee0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe45e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e47f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ee0000 r7:00000000 r6:83018000 r5:00001000 r4:7f9af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eddef000 r7:dddced40 r6:83018000 r5:84e48b8c r4:84ec6c00 INFO: task kworker/0:93:3340 is blocked on a mutex likely owned by task kworker/1:280:5002. r4:00000000 r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:94 state:D stack:0 pid:3342 tgid:3342 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe4de08 r7:dddced40 r6:83018000 r5:84e4a78c r4:84ec6c80 INFO: task kworker/0:94:3342 is blocked on a mutex likely owned by task kworker/1:280:5002. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 Exception stack(0xeb5bdfb0 to 0xeb5bdff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:95 state:D stack:0 pid:3343 tgid:3343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfe59d84 r8:00000002 r7:60000113 r6:dfe59d8c r5:84ee2400 r4:84ee2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ee2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7f600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ee2400 r7:00000000 r6:83018000 r5:00001000 r4:7f9bf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed613000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d1f78c r4:85d1f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d1f78c r4:84ec6d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee2400 r8:84ec6d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ec6d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec6d00 r8:8027ecf4 r7:dfe4de60 r6:84f15500 r5:84ee2400 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r5:00001000 r4:ed5db000 r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84ee3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:96:3345 is blocked on a mutex likely owned by task kworker/1:280:5002. Exception stack(0xeb5bdd20 to 0xeb5bdd68) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ed5db000 r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:853f26c0 task:kworker/0:97 state:D stack:0 pid:3347 tgid:3347 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ee3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dfe140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ee3000 r7:00000000 r6:83018000 r5:00001000 r4:7fa17000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd61000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3bb8c r4:84e3b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3bb8c r4:84ec6e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee3000 r8:84ec6e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ec6e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec6e00 r8:8027ecf4 r7:dfe4de60 r6:84f15600 r5:84ee3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfe79fb0 to 0xdfe79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f16180 INFO: task kworker/0:97:3347 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: e1ca8000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:98:3349 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:98 state:D stack:0 pid:3349 tgid:3349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfe8dd84 r8:00000002 r7:60000113 r6:dfe8dd8c r5:84ee0c00 r4:84ee0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ee0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe8de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ec6e80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84ee4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfea1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e77f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ee4800 r7:00000000 r6:83018000 r5:00001000 r4:7fa57000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5e3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3b38c r4:84e3b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3b38c r4:84ec6f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ee4800 r8:84ec6f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ec6f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ec6f00 r8:8027ecf4 r7:dfe4de60 r6:84f15700 r5:84ee4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfea1fb0 to 0xdfea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f164c0 INFO: task kworker/0:99:3352 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5bdd20 to 0xeb5bdd68) dd20: e2775000 eb259000 00000001 80239b98 7f2c9000 00000001 82ac11c4 82ac05a0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 dd60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r4:eb5bddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 r5:84ee6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ca2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe05e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f16b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ca2400 r7:00000000 r6:83018000 r5:00001000 r4:7fadb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed991000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e4ab8c r4:84e4a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e4ab8c r4:84f27000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca2400 r8:84f2702c r7:82804d40 r6:dddced40 r5:dddced60 r4:84f27000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f27000 r8:8027ecf4 r7:dfeb9e60 r6:84f27080 r5:84ca2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ca3000 r5:84ca3000 r4:829189bc r9:83018005 r8:84ca3000 r7:00000000 r6:83018000 r5:00001000 r4:7fad9000 INFO: task kworker/0:102:3358 is blocked on a mutex likely owned by task kworker/1:280:5002. r5:00001000 r4:ed5db000 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:103:3361 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:103 state:D stack:0 pid:3361 tgid:3361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfee5d84 r8:00000002 r7:60000113 r6:dfee5d8c r5:84de6c00 r4:84de6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84de6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:84e4b78c r4:84e4b400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:eb5bddc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84ca3c00 r5:84ca3c00 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e4bf8c r4:84f27300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ca3c00 r8:84f2732c r7:82804d40 r6:dddced40 r5:dddced60 r4:84f27300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f27300 r8:8027ecf4 r7:dfef1e60 r6:84f27380 r5:84ca3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfec9fb0 to 0xdfec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84f16bc0 dd60: 800f0013 ffffffff r5:00001000 r4:ed5db000 Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:106:3366 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:106 state:D stack:0 pid:3366 tgid:3366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84ca5400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000001 Call trace: r4:eb5bddc0 r5:85989b8c r4:85989800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:84ca6c00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:5003 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:5003 tgid:5003 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855d6000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dd60: 800f0013 ffffffff [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:658:5005 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:658 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5c9d84 r8:00000002 r7:60000113 r6:eb5c9d8c r5:855d6c00 r4:855d6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e6240 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:00000000 r4:8547de00 INFO: task kworker/1:281:5008 blocked for more than 453 seconds. r5:855a3000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:855a3000 r8:8547deac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de80 r8:8027ecf4 r7:eb5b1e60 r6:8547df00 r5:855a3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8547de00 INFO: task kworker/1:282:5010 blocked for more than 453 seconds. r5:855a4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:8547de00 INFO: task kworker/1:283:5011 blocked for more than 453 seconds. r5:855a5400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f27c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84dea38c r4:84dea000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84dea38c r4:85483080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a5400 r8:854830ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85483080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85483080 r8:8027ecf4 r7:eb5c5e60 r6:85483100 r5:855a5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 INFO: task kworker/1:283:5011 is blocked on a mutex likely owned by task kworker/1:280:5002. r4:00000000 r4:eb5bddc0 r5:00001000 r4:ed5db000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:855a6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r7:ddde2d40 r6:83018200 r5:84dea78c r4:85483180 r4:853f2fc0 dd40: 7f2c9000 eb259000 8280c9b4 eb5bdd9c eb5bdda0 eb5bdd70 80230ad4 80239bb0 r5:85989b8c r4:85989800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:855a6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb455000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84deb38c r4:84deb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84deb38c r4:85483280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a6c00 r8:854832ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85483280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85483280 r8:8027ecf4 r7:eb5d9e60 r6:85483300 r5:855a6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2f80 INFO: task kworker/1:285:5016 is blocked on a mutex likely owned by task kworker/1:280:5002. task:kworker/1:280 state:R running task stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855d5400 r8:80200be4 r7:eb5bdd54 r6:ffffffff r5:855d5400 r4:eb5bddc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:855a2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5bddc0 r5:eb5bde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c7b280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989b8c r4:8547de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:8547de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547de00 r8:8027ecf4 r7:eb5b1e60 r6:854ad580 r5:855d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f26c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:287:5020 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:855a8000 r5:855a8000 r4:829189bc [<81a66f10 <> nel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6b9e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b0091000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:834:7132 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:834 state:D stack:0 pid:7132 tgid:7132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed6bdd84 r8:00000002 r7:60000113 r6:ed6bdd8c r5:85710c00 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6bde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:85b5a38c r4:85b5a000 r10:00000000 r9:85a48780 r8:8027ecf4 r7:ed6b9e60 r6:85a48800 r5:85710c00 task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r5:84de9b8c r4:84de9800 r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:853f2bc0 task:kworker/0:835 state:D stack:0 pid:7135 tgid:7135 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adf4c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85711800 r7:00000000 r6:83018000 r5:00001000 r4:7f215000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed213000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5ab8c r4:85b5a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5ab8c r4:85a48880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85711800 r8:85a488ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a48880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a48880 r8:8027ecf4 r7:ed6b9e60 r6:85a48900 r5:85711800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c1fb0 to 0xed6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85adf340 INFO: task kworker/0:835:7135 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b0787000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) Not tainted 6.15.0-syzkaller #0 r5:85712400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c5e08 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:837:7138 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:837 state:D stack:0 pid:7138 tgid:7138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed6c9d84 r8:00000002 r7:60000113 r6:ed6c9d8c r5:85713000 r4:85713000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85713000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adf7c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85713000 r7:00000000 r6:83018000 r5:00001000 r4:7f219000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed319000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5b38c r4:85b5b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5b38c r4:85a48a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85713000 r8:85a48aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a48a80 r10:00000000 r9:85a48a80 r8:8027ecf4 r7:ed6c5e60 r6:85a48b00 r5:85713000 task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eb5d1dc0 r4:00000000 r5:00001000 r4:eb283000 r4:8547df80 Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) Not tainted 6.15.0-syzkaller #0 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r4:00000000 r5:00001000 r4:ed331000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r5:00001000 r4:eb283000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:839:7142 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:839 state:D stack:0 pid:7142 tgid:7142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed6d5d84 r8:00000002 r7:60000013 r6:ed6d5d8c r5:85bfec00 r4:85bfec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bfec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adfb40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bfec00 r7:00000000 r6:83018000 r5:00001000 r4:7f21d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed377000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b5bb8c r4:85b5b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b5bb8c r4:85a48c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bfec00 r8:85a48cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a48c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a48c80 r8:8027ecf4 r7:ed6cde60 r6:85504680 r5:85bfec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6d5fb0 to 0xed6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85adf800 INFO: task kworker/0:839:7142 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:85bfc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adfdc0 r9:83018005 r8:85bfc800 r7:00000000 r6:83018000 r5:00001000 r4:7f221000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4bf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6438c r4:85b64000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b6438c r4:85a48d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bfc800 r8:85a48d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a48d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a48d00 r8:8027ecf4 r7:ed6d5e60 r6:85504700 r5:85bfc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6d9fb0 to 0xed6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85adf9c0 INFO: task kworker/0:840:7144 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b1445000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 INFO: task kworker/0:841:7146 blocked for more than 474 seconds. r4:85bfbc00 r5:85bfbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6dde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adfc80 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 800f0013 ffffffff r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:842:7148 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:842 state:D stack:0 pid:7148 tgid:7148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed6e9d84 r8:00000002 r7:60000013 r6:ed6e9d8c r5:85bfb000 r4:85bfb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bfb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6e9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85adfd80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bfb000 r7:00000000 r6:83018000 r5:00001000 r4:7f225000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6478c r4:85b64400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85bfb000 r8:85a48e2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eb5d1dc0 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:843:7150 blocked for more than 474 seconds. r5:85bf8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b1920000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:844:7151 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:844 state:D stack:0 pid:7151 tgid:7151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed6f9d84 r8:00000002 r7:60000113 r6:ed6f9d8c r5:85bfa400 r4:85bfa400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bfa400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6f9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85add040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bfa400 r7:00000000 r6:83018000 r5:00001000 r4:7f229000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed707000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85bfa400 r8:85a48f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85adfe80 Workqueue: events bpf_prog_free_deferred 1d60: 800f0013 ffffffff r4:eb5d1dc0 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r4:8547df80 Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) INFO: task kworker/0:845:7154 blocked for more than 474 seconds. r5:85714800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f73c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85714800 r7:00000000 r6:83018000 r5:00001000 r4:7f227000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6fb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b64b8c r4:85b64800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b64b8c r4:85a48f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85714800 r8:85a48fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a48f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a48f80 r8:8027ecf4 r7:ed6f9e60 r6:84e99000 r5:85714800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6d1fb0 to 0xed6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f73e00 INFO: task kworker/0:845:7154 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b1cf1000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84de9b8c r4:84de9800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:846:7156 blocked for more than 474 seconds. r4:85716000 r5:85716000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85add440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85716000 r7:00000000 r6:83018000 r5:00001000 r4:7f22d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed723000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b6578c r4:85b65400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b6578c r4:84e99080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85716000 r8:84e990ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84e99080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e99080 r8:8027ecf4 r7:ed6f9e60 r6:84e99100 r5:85716000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed705fb0 to 0xed705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85add1c0 INFO: task kworker/0:846:7156 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b2134000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 Not tainted 6.15.0-syzkaller #0 r4:85bfe000 r5:85bfe000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed721e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85b6538c r4:84e99180 Exception stack(0xed721fb0 to 0xed721ff8) Workqueue: events bpf_prog_free_deferred r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:848:7161 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:848 state:D stack:0 pid:7161 tgid:7161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed73dd84 r8:00000002 r7:60000013 r6:ed73dd8c r5:85bf8c00 r4:85bf8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bf8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed73de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85add580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bf8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f22f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed72f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85b65b8c r4:84e99200 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r5:00001000 r4:eb283000 r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:849:7162 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:849 state:D stack:0 pid:7162 tgid:7162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85c08000 r5:85c08000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed741e08 r9:83018005 r8:85c08000 r7:00000000 r6:83018000 r5:00001000 r4:7f233000 r10:61c88647 r9:85c08000 r8:84e992ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85715400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6e1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85add740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85715400 r7:00000000 r6:83018000 r5:00001000 r4:7f231000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed743000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b65f8c r4:85b65c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b65f8c r4:84e99300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85715400 r8:84e9932c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e99300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e99300 r8:8027ecf4 r7:ed741e60 r6:84e99380 r5:85715400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6e1fb0 to 0xed6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85add680 INFO: task kworker/0:850:7164 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b284e000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:851:7165 blocked for more than 474 seconds. r5:84d00000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85b6678c r4:84e99400 Exception stack(0xed739fb0 to 0xed739ff8) task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eb5d1dc0 r5:00001000 r4:eb283000 r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:852:7169 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:852 state:D stack:0 pid:7169 tgid:7169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed75dd84 r8:00000002 r7:60000113 r6:ed75dd8c r5:84d01800 r4:84d01800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d01800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed75de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c94700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d01800 r7:00000000 r6:83018000 r5:00001000 r4:7f301000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b67b8c r4:85b67800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b67b8c r4:84e99500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d01800 r8:84e9952c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e99500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e99500 r8:8027ecf4 r7:ed739e60 r6:84e99580 r5:84d01800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed75dfb0 to 0xed75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85add980 INFO: task kworker/0:852:7169 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b2d98000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d02400 r5:84d02400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed711e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b66b8c r4:85b66800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85addac0 INFO: task kworker/0:853:7173 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b2d98000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 INFO: task kworker/0:854:7175 blocked for more than 474 seconds. r5:84d03000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed655e08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85b6738c r4:85b67000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:854:7175 is blocked on a mutex likely owned by task kworker/1:282:5010. Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b322e000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:855:7254 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:855 state:D stack:0 pid:7254 tgid:7254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed8f1d84 r8:00000002 r7:60000113 r6:ed8f1d8c r5:84d06c00 r4:84d06c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d06c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c94b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d06c00 r7:00000000 r6:83018000 r5:00001000 r4:7f309000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd39000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3178c r4:84e31400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3178c r4:84e99800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 800f0013 ffffffff r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:856:7315 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:856 state:D stack:0 pid:7315 tgid:7315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed9d5d84 r8:00000002 r7:60000113 r6:ed9d5d8c r5:84d05400 r4:84d05400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d05400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c94c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d05400 r7:00000000 r6:83018000 r5:00001000 r4:7f311000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3138c r4:84e31000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3138c r4:84e99900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84d05400 r8:84e9992c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e99900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e99900 r8:8027ecf4 r7:ed8f1e60 r6:84e99980 r5:84d05400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed9d5fb0 to 0xed9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85c94900 INFO: task kworker/0:856:7315 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:84d03c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r9:83018005 r8:84d03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f313000 r10:61c88647 r9:84d03c00 r8:84e99a2c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:858:7321 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:858 state:D stack:0 pid:7321 tgid:7321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed879d84 r8:00000002 r7:60000113 r6:ed879d8c r5:84d06000 r4:84d06000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d06000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed879e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c94500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d06000 r7:00000000 r6:83018000 r5:00001000 r4:7f33b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8e9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7078c r4:85b70400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84d06000 r8:84e99b2c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b42e0000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:859:7324 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:859 state:D stack:0 pid:7324 tgid:7324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed871d84 r8:00000002 r7:60000113 r6:ed871d8c r5:84d00c00 r4:84d00c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84d00c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed871e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c94800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84d00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f339000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r5:84de9b8c r4:84de9800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84d04800 r5:84d04800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c94100 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84d04800 r8:84e99d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84e99d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e99d00 r8:8027ecf4 r7:ed879e60 r6:84e99d80 r5:84d04800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed885fb0 to 0xed885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85c94f00 INFO: task kworker/0:860:7344 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b42e0000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:eb283000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:861 state:D stack:0 pid:7346 tgid:7346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed905d84 r8:00000002 r7:60000113 r6:ed905d8c r5:85a86000 r4:85a86000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a86000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed905e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c93480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a86000 r7:00000000 r6:83018000 r5:00001000 r4:7f34b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:861:7346 is blocked on a mutex likely owned by task kworker/1:282:5010. 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 r4:00000000 r5:84de9b8c r4:84de9800 r4:8547df80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85716c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:85c93000 Workqueue: events bpf_prog_free_deferred [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b4baf000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:863:7350 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:863 state:D stack:0 pid:7350 tgid:7350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ed8edd84 r8:00000002 r7:60000113 r6:ed8edd8c r5:84150000 r4:84150000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84150000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8ede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c93380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84150000 r7:00000000 r6:83018000 r5:00001000 r4:7f347000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed961000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b7138c r4:85b71000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b7138c r4:85c98000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84150000 r8:85c9802c r7:82804d40 r6:dddced40 r5:dddced60 r4:85c98000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c98000 r8:8027ecf4 r7:ed905e60 r6:85c98080 r5:84150000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8edfb0 to 0xed8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85c93000 INFO: task kworker/0:863:7350 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b500e000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 r5:84de9b8c r4:84de9800 r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 INFO: task kworker/0:864:7356 blocked for more than 474 seconds. r5:84150c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r9:83018005 r8:84150c00 r7:00000000 r6:83018000 r5:00001000 r4:7f34f000 r7:dddced40 r6:83018000 r5:85b71f8c r4:85c98180 Exception stack(0xed94dfb0 to 0xed94dff8) task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84151800 r5:84151800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda55e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad7780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84151800 r7:00000000 r6:83018000 r5:00001000 r4:7f51b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaf7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cfc78c r4:85cfc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cfc78c r4:85c98280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84151800 r8:85c982ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c98280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c98280 r8:8027ecf4 r7:ed94de60 r6:85c98300 r5:84151800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda55fb0 to 0xeda55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85c93600 INFO: task kworker/0:865:7358 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b588d000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84152400 r5:84152400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:84152400 r7:00000000 r6:83018000 r5:00001000 r4:7f371000 r4:85c98380 Exception stack(0xeda69fb0 to 0xeda69ff8) task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:867:7381 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:867 state:D stack:0 pid:7381 tgid:7381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eda21d84 r8:00000002 r7:60000113 r6:eda21d8c r5:84153000 r4:84153000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84153000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda21e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c93440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84153000 r7:00000000 r6:83018000 r5:00001000 r4:7f37f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b72b8c r4:85b72800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85b72b8c r4:85c98480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84153000 r8:85c984ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c98480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c98480 r8:8027ecf4 r7:eda55e60 r6:85c98500 r5:84153000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda21fb0 to 0xeda21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85c93f80 INFO: task kworker/0:867:7381 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b5bac000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r4:8547df80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:868 state:D stack:0 pid:7403 tgid:7403 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84154800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:84154800 r7:00000000 r6:83018000 r5:00001000 r4:7f3ff000 r4:85c98580 Exception stack(0xeda41fb0 to 0xeda41ff8) task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r4:8547df80 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:84155400 r5:84155400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedb49fb0 to 0xedb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547a000 INFO: task kworker/0:869:7511 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b5f43000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) INFO: task kworker/0:870:7528 blocked for more than 474 seconds. r5:84156000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edb8de08 r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedb8dfb0 to 0xedb8dff8) INFO: task kworker/0:870:7528 is blocked on a mutex likely owned by task kworker/1:282:5010. r5:800f0013 r4:80239bb0 r4:eb5d1dc0 r5:00001000 r4:eb283000 r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edcd9d84 r8:00000002 r7:60000113 r6:edcd9d8c r5:857f9800 r4:857f9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcd9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d85680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f5d9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ededf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3938c r4:84e39000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3938c r4:85c98880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f9800 r8:85c988ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c98880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c98880 r8:8027ecf4 r7:eda55e60 r6:85c98900 r5:857f9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcd9fb0 to 0xedcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85b7bd80 INFO: task kworker/0:871:7587 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b67c7000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:872:7635 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:872 state:D stack:0 pid:7635 tgid:7635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eddbdd84 r8:00000002 r7:60000113 r6:eddbdd8c r5:857fa400 r4:857fa400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fa400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddbde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ad7ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f539000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eddd7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3278c r4:84e32400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3278c r4:85c98980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fa400 r8:85c989ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c98980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c98980 r8:8027ecf4 r7:edcd9e60 r6:85c98a00 r5:857fa400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:857fe000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d85280 r7:dddced40 r6:83018000 r5:85d9c38c r4:85c98a80 Exception stack(0xeddfdfb0 to 0xeddfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85ad9300 INFO: task kworker/0:873:7664 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b6d19000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:874:7723 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:874 state:D stack:0 pid:7723 tgid:7723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edde5d84 r8:00000002 r7:60000113 r6:edde5d8c r5:857f8000 r4:857f8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edde5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d85740 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:874:7723 is blocked on a mutex likely owned by task kworker/1:282:5010. r4:82ac11e4 r4:eb5d1dc0 r5:00001000 r4:eb283000 r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:875:7729 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:875 state:D stack:0 pid:7729 tgid:7729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eddf5d84 r8:00000002 r7:60000113 r6:eddf5d8c r5:857fbc00 r4:857fbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eddf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505b700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f637000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3838c r4:84e38000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3838c r4:85c98c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fbc00 r8:85c98cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c98c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c98c80 r8:8027ecf4 r7:edde5e60 r6:85c98d00 r5:857fbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeddf5fb0 to 0xeddf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d855c0 INFO: task kworker/0:875:7729 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b7119000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:876:7778 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:876 state:D stack:0 pid:7778 tgid:7778 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:857fd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edef1e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r5:00001000 r4:eb283000 r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:857fc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfe9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505bf80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f635000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9f3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3878c r4:84e38400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3878c r4:85c98e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fc800 r8:85c98eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c98e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c98e80 r8:8027ecf4 r7:eddf5e60 r6:85c98f00 r5:857fc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedfe9fb0 to 0xedfe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505be00 INFO: task kworker/0:877:7781 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b78e1000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r4:8547df80 Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) r4:853f2bc0 Workqueue: events bpf_prog_free_deferred r5:857fec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edfdde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85c98f80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d60: 800f0013 ffffffff r4:eb5d1dc0 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:879:7785 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:879 state:D stack:0 pid:7785 tgid:7785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edff5d84 r8:00000002 r7:60000013 r6:edff5d8c r5:857f8c00 r4:857f8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edff5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc8400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f641000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d2cf8c r4:85d2cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d2cf8c r4:85a42000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f8c00 r8:85a4202c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42000 r8:8027ecf4 r7:edfdde60 r6:85a42080 r5:857f8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedff5fb0 to 0xedff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8505b480 INFO: task kworker/0:879:7785 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 r4:eb5d1dc0 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r4:8547df80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:880 state:D stack:0 pid:7787 tgid:7787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:857fb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85d2c78c r4:85d2c400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ebfa40 Call trace: Exception stack(0xeb5d1d20 to 0xeb5d1d68) r4:eb5d1dc0 r4:00000000 r5:84de9b8c r4:84de9800 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:881:7790 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:881 state:D stack:0 pid:7790 tgid:7790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee005d84 r8:00000002 r7:60000113 r6:ee005d8c r5:84153c00 r4:84153c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84153c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee005e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc8040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84153c00 r7:00000000 r6:83018000 r5:00001000 r4:7f63f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d2cb8c r4:85d2c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d2cb8c r4:85a42200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84153c00 r8:85a4222c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42200 r8:8027ecf4 r7:edff5e60 r6:85a42280 r5:84153c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee005fb0 to 0xee005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85cc8100 INFO: task kworker/0:881:7790 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b805a000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:882:7791 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:882 state:D stack:0 pid:7791 tgid:7791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee009d84 r8:00000002 r7:60000113 r6:ee009d8c r5:85290c00 r4:85290c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85290c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee009e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc8640 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85290c00 r8:85a4232c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eb5d1dc0 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85c0e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee001e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc8740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f645000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbcb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d2d78c r4:85d2d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d2d78c r4:85a42400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c0e000 r8:85a4242c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42400 r8:8027ecf4 r7:ee009e60 r6:85504b00 r5:85c0e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee001fb0 to 0xee001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85cc8280 INFO: task kworker/0:883:7793 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b848d000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853f2bc0 Workqueue: events bpf_prog_free_deferred r5:85c0a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee015e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xee015fb0 to 0xee015ff8) task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 800f0013 ffffffff r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:885:7798 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:7798 tgid:7798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee01dd84 r8:00000002 r7:60000113 r6:ee01dd8c r5:85c09800 r4:85c09800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c09800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee01de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc8b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c09800 r7:00000000 r6:83018000 r5:00001000 r4:7f64b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc3b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d2e38c r4:85d2e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d2e38c r4:85a42500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c09800 r8:85a4252c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 800f0013 ffffffff r4:eb5d1dc0 r5:00001000 r4:eb283000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85c0c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:887:7802 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:887 state:D stack:0 pid:7802 tgid:7802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee02dd84 r8:00000002 r7:60000113 r6:ee02dd8c r5:85c0bc00 r4:85c0bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c0bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee02de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc8ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f651000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd63000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d2ef8c r4:85d2ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d2ef8c r4:85a42600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c0bc00 r8:85a4262c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42600 r8:8027ecf4 r7:ee01de60 r6:85504d00 r5:85c0bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee02dfb0 to 0xee02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85cc87c0 INFO: task kworker/0:887:7802 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b9185000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r5:00001000 r4:eb283000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85c08c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc8c80 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:7805 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:889 state:D stack:0 pid:7805 tgid:7805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edff9d84 r8:00000002 r7:60000113 r6:edff9d8c r5:85291800 r4:85291800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85291800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edff9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc8d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85291800 r7:00000000 r6:83018000 r5:00001000 r4:7f64f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd09000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d2eb8c r4:85d2e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d2eb8c r4:85a42700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85291800 r8:85a4272c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42700 r8:8027ecf4 r7:ee02de60 r6:85a42780 r5:85291800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedff9fb0 to 0xedff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85cc8a80 INFO: task kworker/0:889:7805 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eb5d1dc0 r5:00001000 r4:eb283000 r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85292400 r5:85292400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee035e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cc80c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85292400 r7:00000000 r6:83018000 r5:00001000 r4:7f653000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd9f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d2f38c r4:85d2f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d2f38c r4:85a42800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85292400 r8:85a4282c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42800 r8:8027ecf4 r7:ee02de60 r6:85a42880 r5:85292400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee035fb0 to 0xee035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85cc8d40 INFO: task kworker/0:890:7809 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b9a13000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:eb5d1dc0 r5:00001000 r4:eb283000 r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:891:7810 blocked for more than 475 seconds. task:kworker/0:891 state:D stack:0 pid:7810 tgid:7810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee00dd84 r8:00000002 r7:60000013 r6:ee00dd8c r5:85293000 r4:85293000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85293000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee00de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca1040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85293000 r7:00000000 r6:83018000 r5:00001000 r4:7f655000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eddc1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d2f78c r4:85d2f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d2f78c r4:85a42900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85293000 r8:85a4292c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42900 r8:8027ecf4 r7:ee035e60 r6:85a42980 r5:85293000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee00dfb0 to 0xee00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85cc8d40 INFO: task kworker/0:891:7810 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:892:7812 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:892 state:D stack:0 pid:7812 tgid:7812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85293c00 r5:85293c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee03de08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85d2fb8c r4:85a42a00 Exception stack(0xee03dfb0 to 0xee03dff8) task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:eb283000 r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85295400 r5:85295400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee045e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca15c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85295400 r7:00000000 r6:83018000 r5:00001000 r4:7f65b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede3b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d2ff8c r4:85d2fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d2ff8c r4:85a42b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85295400 r8:85a42b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42b00 r8:8027ecf4 r7:ee03de60 r6:85a42b80 r5:85295400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee045fb0 to 0xee045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85ca1180 INFO: task kworker/0:893:7814 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: b9ef1000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85296000 r5:85296000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee049e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca17c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85296000 r7:00000000 r6:83018000 r5:00001000 r4:7f65d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede47000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3438c r4:85d34000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d3438c r4:85a42c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85296000 r8:85a42c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42c00 r8:8027ecf4 r7:ee045e60 r6:85a42c80 r5:85296000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee049fb0 to 0xee049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85ca1380 INFO: task kworker/0:894:7817 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: ba298000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:895:7819 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:895 state:D stack:0 pid:7819 tgid:7819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85c0d400 r5:85c0d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee051e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85a42d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42d00 r8:8027ecf4 r7:ee049e60 r6:85504e00 r5:85c0d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee051fb0 to 0xee051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85ca1640 INFO: task kworker/0:895:7819 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: ba653000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d60: 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:8547df80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85c0b000 r5:85c0b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xee059fb0 to 0xee059ff8) Workqueue: events bpf_prog_free_deferred 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:897:7823 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:897 state:D stack:0 pid:7823 tgid:7823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee061d84 r8:00000002 r7:60000013 r6:ee061d8c r5:85c0ec00 r4:85c0ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85c0ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca1e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85c0ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f667000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edeab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3578c r4:85d35400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d3578c r4:85a42e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85c0ec00 r8:85a42e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42e00 r8:8027ecf4 r7:ee059e60 r6:85504f00 r5:85c0ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee061fb0 to 0xee061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85ca18c0 INFO: task kworker/0:897:7823 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: babbd000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:898:7824 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:898 state:D stack:0 pid:7824 tgid:7824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee065d84 r8:00000002 r7:60000113 r6:ee065d8c r5:85d20000 r4:85d20000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d20000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee065e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca1b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85d20000 r7:00000000 r6:83018000 r5:00001000 r4:7f663000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d34f8c r4:85d34c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d34f8c r4:85a42e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d20000 r8:85a42eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42e80 r8:8027ecf4 r7:ee061e60 r6:85504f80 r5:85d20000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee065fb0 to 0xee065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85ca18c0 INFO: task kworker/0:898:7824 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: babbd000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:899:7826 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:899 state:D stack:0 pid:7826 tgid:7826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee06dd84 r8:00000002 r7:60000013 r6:ee06dd8c r5:85d21800 r4:85d21800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d21800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee06de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca1cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85d21800 r7:00000000 r6:83018000 r5:00001000 r4:7f665000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edea1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3538c r4:85d35000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d3538c r4:85a42f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d21800 r8:85a42f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42f00 r8:8027ecf4 r7:ee061e60 r6:85d90000 r5:85d21800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee06dfb0 to 0xee06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85ca1940 INFO: task kworker/0:899:7826 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: baddf000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:900:7828 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:900 state:D stack:0 pid:7828 tgid:7828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee075d84 r8:00000002 r7:60000113 r6:ee075d8c r5:85d20c00 r4:85d20c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d20c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee075e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d19600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85d20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f92b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed981000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3cb8c r4:84e3c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3cb8c r4:85a42f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d20c00 r8:85a42fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a42f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a42f80 r8:8027ecf4 r7:ee061e60 r6:85d90080 r5:85d20c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee075fb0 to 0xee075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85ca1ac0 INFO: task kworker/0:900:7828 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bb16f000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:901:7830 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:901 state:D stack:0 pid:7830 tgid:7830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee07dd84 r8:00000002 r7:60000113 r6:ee07dd8c r5:85d22400 r4:85d22400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d22400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee07de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ca1f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85d22400 r7:00000000 r6:83018000 r5:00001000 r4:7f669000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edeb5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d35b8c r4:85d35800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d35b8c r4:85d91000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d22400 r8:85d9102c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91000 r8:8027ecf4 r7:ee075e60 r6:85d90100 r5:85d22400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee07dfb0 to 0xee07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85ca1c40 INFO: task kworker/0:901:7830 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bb7ad000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:902:7832 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:902 state:D stack:0 pid:7832 tgid:7832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee085d84 r8:00000002 r7:60000013 r6:ee085d8c r5:85d23000 r4:85d23000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d23000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee085e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ebcac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85d23000 r7:00000000 r6:83018000 r5:00001000 r4:7f66b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edec1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d35f8c r4:85d35c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d35f8c r4:85d91080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d23000 r8:85d910ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91080 r8:8027ecf4 r7:ee075e60 r6:85d90180 r5:85d23000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee085fb0 to 0xee085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebca80 INFO: task kworker/0:902:7832 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bb7ad000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:903:7834 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:903 state:D stack:0 pid:7834 tgid:7834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee04dd84 r8:00000002 r7:60000113 r6:ee04dd8c r5:85296c00 r4:85296c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85296c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee04de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c6d280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85296c00 r7:00000000 r6:83018000 r5:00001000 r4:7f66f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eded5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d3638c r4:85d36000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d3638c r4:85d91100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85296c00 r8:85d9112c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91100 r8:8027ecf4 r7:ee075e60 r6:85d91180 r5:85296c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee04dfb0 to 0xee04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84ebca80 INFO: task kworker/0:903:7834 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bb968000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:904:7847 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:904 state:D stack:0 pid:7847 tgid:7847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee0b5d84 r8:00000002 r7:60000113 r6:ee0b5d8c r5:84156c00 r4:84156c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84156c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee0b5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d19400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84156c00 r7:00000000 r6:83018000 r5:00001000 r4:7f927000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed943000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3d38c r4:84e3d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3d38c r4:85d91200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84156c00 r8:85d9122c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91200 r8:8027ecf4 r7:ee075e60 r6:85d91280 r5:84156c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee0b5fb0 to 0xee0b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d8e600 INFO: task kworker/0:904:7847 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bc1eb000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:905:8238 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:905 state:D stack:0 pid:8238 tgid:8238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edcddd84 r8:00000002 r7:60000113 r6:edcddd8c r5:847c9800 r4:847c9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcdde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d19500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f929000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed975000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cb6b8c r4:85cb6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cb6b8c r4:85d91300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c9800 r8:85d9132c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91300 r8:8027ecf4 r7:ee075e60 r6:85d91380 r5:847c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcddfb0 to 0xedcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d19200 INFO: task kworker/0:905:8238 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bc1eb000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:906:8241 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:906 state:D stack:0 pid:8241 tgid:8241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edce1d84 r8:00000002 r7:60000113 r6:edce1d8c r5:847ce000 r4:847ce000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ce000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edce1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d19800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f92f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed995000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3c78c r4:84e3c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3c78c r4:85d91400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ce000 r8:85d9142c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91400 r8:8027ecf4 r7:ee075e60 r6:85d91480 r5:847ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedce1fb0 to 0xedce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d19380 INFO: task kworker/0:906:8241 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bc7d8000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:907:8242 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:907 state:D stack:0 pid:8242 tgid:8242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edaadd84 r8:00000002 r7:60000113 r6:edaadd8c r5:847cb000 r4:847cb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edaade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85488580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847cb000 r7:00000000 r6:83018000 r5:00001000 r4:7fa63000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc33000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d73f8c r4:85d73c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d73f8c r4:85d91500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cb000 r8:85d9152c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91500 r8:8027ecf4 r7:edce1e60 r6:85d91580 r5:847cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedaadfb0 to 0xedaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d19380 INFO: task kworker/0:907:8242 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bc7d8000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:908:8245 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:908 state:D stack:0 pid:8245 tgid:8245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edce9d84 r8:00000002 r7:60000113 r6:edce9d8c r5:847cbc00 r4:847cbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edce9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85961680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f963000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed803000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e4878c r4:84e48400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e4878c r4:85d91600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cbc00 r8:85d9162c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91600 r8:8027ecf4 r7:edaade60 r6:85d91680 r5:847cbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedce9fb0 to 0xedce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85d19680 INFO: task kworker/0:908:8245 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bce4a000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:909:8287 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:909 state:D stack:0 pid:8287 tgid:8287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ede15d84 r8:00000002 r7:60000113 r6:ede15d8c r5:847cc800 r4:847cc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede15e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cadb40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f9b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede93000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d1df8c r4:85d1dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d1df8c r4:85d91700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cc800 r8:85d9172c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91700 r8:8027ecf4 r7:edaade60 r6:85d91780 r5:847cc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xede15fb0 to 0xede15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85961880 INFO: task kworker/0:909:8287 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bd3d9000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:910:8331 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:910 state:D stack:0 pid:8331 tgid:8331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edcf1d84 r8:00000002 r7:60000113 r6:edcf1d8c r5:847cec00 r4:847cec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcf1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ec2fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f9c7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed701000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e48f8c r4:84e48c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e48f8c r4:85d91800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cec00 r8:85d9182c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91800 r8:8027ecf4 r7:edaade60 r6:85d91880 r5:847cec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedcf1fb0 to 0xedcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85961640 INFO: task kworker/0:910:8331 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bd3d9000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:911:8339 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:911 state:D stack:0 pid:8339 tgid:8339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edf15d84 r8:00000002 r7:60000113 r6:edf15d8c r5:847cd400 r4:847cd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847cd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf15e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dfe740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f9e1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda7b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e4838c r4:84e48000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e4838c r4:85d91900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847cd400 r8:85d9192c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91900 r8:8027ecf4 r7:edaade60 r6:85d91980 r5:847cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf15fb0 to 0xedf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85de7d40 INFO: task kworker/0:911:8339 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bd3d9000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:912:8353 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:912 state:D stack:0 pid:8353 tgid:8353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edf25d84 r8:00000002 r7:60000113 r6:edf25d8c r5:847c8c00 r4:847c8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf25e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dfe840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f9e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda8f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3bf8c r4:84e3bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3bf8c r4:85d91a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8c00 r8:85d91a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91a00 r8:8027ecf4 r7:edaade60 r6:85d91a80 r5:847c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf25fb0 to 0xedf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85dfe640 INFO: task kworker/0:912:8353 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bd8f8000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:8356 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:8356 tgid:8356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edf59d84 r8:00000002 r7:60000113 r6:edf59d8c r5:847c8000 r4:847c8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e77640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847c8000 r7:00000000 r6:83018000 r5:00001000 r4:7fa2f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed983000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3b78c r4:84e3b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3b78c r4:85d91b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c8000 r8:85d91b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91b00 r8:8027ecf4 r7:edaade60 r6:85d91b80 r5:847c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf59fb0 to 0xedf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85dfe7c0 INFO: task kworker/0:913:8356 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bd8f8000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:914:8402 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:914 state:D stack:0 pid:8402 tgid:8402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:edf0dd84 r8:00000002 r7:60000113 r6:edf0dd8c r5:85d26c00 r4:85d26c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d26c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edf0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e77d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85d26c00 r7:00000000 r6:83018000 r5:00001000 r4:7fa59000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed663000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e3af8c r4:84e3ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e3af8c r4:85d91c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d26c00 r8:85d91c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91c00 r8:8027ecf4 r7:edaade60 r6:85d90300 r5:85d26c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedf0dfb0 to 0xedf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85e774c0 INFO: task kworker/0:914:8402 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bd8f8000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:915:8427 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:915 state:D stack:0 pid:8427 tgid:8427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee17dd84 r8:00000002 r7:60000013 r6:ee17dd8c r5:85294800 r4:85294800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85294800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee17de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ba3500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85294800 r7:00000000 r6:83018000 r5:00001000 r4:7fae3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edae3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e49b8c r4:84e49800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e49b8c r4:85d91c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85294800 r8:85d91cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91c80 r8:8027ecf4 r7:edaade60 r6:85d91d00 r5:85294800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee17dfb0 to 0xee17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85e77980 INFO: task kworker/0:915:8427 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bdef8000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:916:8431 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:916 state:D stack:0 pid:8431 tgid:8431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee181d84 r8:00000002 r7:60000013 r6:ee181d8c r5:85290000 r4:85290000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85290000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee181e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f16880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85290000 r7:00000000 r6:83018000 r5:00001000 r4:7fadf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda85000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e4a38c r4:84e4a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e4a38c r4:85d91d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85290000 r8:85d91dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91d80 r8:8027ecf4 r7:ee17de60 r6:85d91e00 r5:85290000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee181fb0 to 0xee181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85e77980 INFO: task kworker/0:916:8431 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: be469000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:917:8497 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:917 state:D stack:0 pid:8497 tgid:8497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee1e5d84 r8:00000002 r7:60000013 r6:ee1e5d8c r5:847e3c00 r4:847e3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f16900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7fae1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edabb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e49f8c r4:84e49c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e49f8c r4:85d91e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3c00 r8:85d91eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91e80 r8:8027ecf4 r7:ee17de60 r6:85d91f00 r5:847e3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1e5fb0 to 0xee1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f16d80 INFO: task kworker/0:917:8497 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: be617000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:918:8500 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:918 state:D stack:0 pid:8500 tgid:8500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee2c1d84 r8:00000002 r7:60000013 r6:ee2c1d8c r5:847e5400 r4:847e5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ecafc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e5400 r7:00000000 r6:83018000 r5:00001000 r4:7fae5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb53000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84e4978c r4:84e49400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84e4978c r4:85d91f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e5400 r8:85d91fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85d91f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85d91f80 r8:8027ecf4 r7:ee17de60 r6:85486000 r5:847e5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2c1fb0 to 0xee2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f165c0 INFO: task kworker/0:918:8500 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: be617000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:919:8502 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:919 state:D stack:0 pid:8502 tgid:8502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee1bdd84 r8:00000002 r7:60000013 r6:ee1bdd8c r5:847e6c00 r4:847e6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee1bde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af1100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7fae7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb9f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4038c r4:85d40000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4038c r4:85486080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e6c00 r8:854860ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486080 r8:8027ecf4 r7:ee2c1e60 r6:85486100 r5:847e6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee1bdfb0 to 0xee1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84f16680 INFO: task kworker/0:919:8502 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bea07000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:920:8504 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:920 state:D stack:0 pid:8504 tgid:8504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee2d1d84 r8:00000002 r7:60000013 r6:ee2d1d8c r5:847e2400 r4:847e2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af1400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e2400 r7:00000000 r6:83018000 r5:00001000 r4:7fae9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbf9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4078c r4:85d40400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4078c r4:85486180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e2400 r8:854861ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486180 r8:8027ecf4 r7:ee1bde60 r6:85486200 r5:847e2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2d1fb0 to 0xee2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85af1080 INFO: task kworker/0:920:8504 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: beefa000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:921:8506 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:921 state:D stack:0 pid:8506 tgid:8506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee2d9d84 r8:00000002 r7:60000113 r6:ee2d9d8c r5:847e4800 r4:847e4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af1640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e4800 r7:00000000 r6:83018000 r5:00001000 r4:7faeb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d40b8c r4:85d40800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d40b8c r4:85486280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e4800 r8:854862ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486280 r8:8027ecf4 r7:ee2d1e60 r6:85486300 r5:847e4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2d9fb0 to 0xee2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85af1280 INFO: task kworker/0:921:8506 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bf3c0000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:8509 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:8509 tgid:8509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee2e5d84 r8:00000002 r7:60000013 r6:ee2e5d8c r5:847e6000 r4:847e6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f16740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e6000 r7:00000000 r6:83018000 r5:00001000 r4:7faf9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edecd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d41f8c r4:85d41c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d41f8c r4:85486380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e6000 r8:854863ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486380 r8:8027ecf4 r7:ee2d9e60 r6:85486400 r5:847e6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2e5fb0 to 0xee2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85af14c0 INFO: task kworker/0:922:8509 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bf3c0000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:923:8510 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:923 state:D stack:0 pid:8510 tgid:8510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee2e9d84 r8:00000002 r7:60000113 r6:ee2e9d8c r5:847e3000 r4:847e3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2e9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af1780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e3000 r7:00000000 r6:83018000 r5:00001000 r4:7faed000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edccd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d40f8c r4:85d40c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d40f8c r4:85486480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3000 r8:854864ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486480 r8:8027ecf4 r7:ee2e5e60 r6:85486500 r5:847e3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2e9fb0 to 0xee2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85af1600 INFO: task kworker/0:923:8510 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bf3c0000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:8512 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:924 state:D stack:0 pid:8512 tgid:8512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee2f1d84 r8:00000002 r7:60000113 r6:ee2f1d8c r5:847e1800 r4:847e1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af1600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e1800 r7:00000000 r6:83018000 r5:00001000 r4:7faef000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd3f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4138c r4:85d41000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4138c r4:85486580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e1800 r8:854865ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486580 r8:8027ecf4 r7:ee2e5e60 r6:85486600 r5:847e1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2f1fb0 to 0xee2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85af18c0 INFO: task kworker/0:924:8512 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bf87e000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:925:8513 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:925 state:D stack:0 pid:8513 tgid:8513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee2fdd84 r8:00000002 r7:60000013 r6:ee2fdd8c r5:847ca400 r4:847ca400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ca400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af1c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847ca400 r7:00000000 r6:83018000 r5:00001000 r4:7faf1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd8b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4178c r4:85d41400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4178c r4:85486680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847ca400 r8:854866ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486680 r8:8027ecf4 r7:ee2e5e60 r6:85486700 r5:847ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2fdfb0 to 0xee2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85af1a80 INFO: task kworker/0:925:8513 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bf87e000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:926:8516 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:926 state:D stack:0 pid:8516 tgid:8516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee2cdd84 r8:00000002 r7:60000113 r6:ee2cdd8c r5:85d23c00 r4:85d23c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d23c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee2cde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af1f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85d23c00 r7:00000000 r6:83018000 r5:00001000 r4:7faf5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ede39000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d41b8c r4:85d41800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d41b8c r4:85486780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d23c00 r8:854867ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486780 r8:8027ecf4 r7:ee2e5e60 r6:85d90380 r5:85d23c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee2cdfb0 to 0xee2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85af1980 INFO: task kworker/0:926:8516 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: bfca6000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:927:8520 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:927 state:D stack:0 pid:8520 tgid:8520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee30dd84 r8:00000002 r7:60000113 r6:ee30dd8c r5:85d24800 r4:85d24800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85d24800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee30de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855088c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85d24800 r7:00000000 r6:83018000 r5:00001000 r4:7fb05000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edff1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4338c r4:85d43000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4338c r4:85486800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85d24800 r8:8548682c r7:82804d40 r6:dddced40 r5:dddced60 r4:85486800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486800 r8:8027ecf4 r7:ee2e5e60 r6:85d90400 r5:85d24800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee30dfb0 to 0xee30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85af1ec0 INFO: task kworker/0:927:8520 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c01d0000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:8522 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:8522 tgid:8522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee315d84 r8:00000002 r7:60000113 r6:ee315d8c r5:85bf9800 r4:85bf9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85bf9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee315e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85bf9800 r7:00000000 r6:83018000 r5:00001000 r4:7fafb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edef9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4238c r4:85d42000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4238c r4:85486880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85bf9800 r8:854868ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486880 r8:8027ecf4 r7:ee30de60 r6:85d90480 r5:85bf9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee315fb0 to 0xee315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855080c0 INFO: task kworker/0:928:8522 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c058a000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:929:8524 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:929 state:D stack:0 pid:8524 tgid:8524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee31dd84 r8:00000002 r7:60000013 r6:ee31dd8c r5:840ad400 r4:840ad400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:840ad400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee31de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:840ad400 r7:00000000 r6:83018000 r5:00001000 r4:7fafd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf3b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4278c r4:85d42400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4278c r4:85486900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840ad400 r8:8548692c r7:82804d40 r6:dddced40 r5:dddced60 r4:85486900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486900 r8:8027ecf4 r7:ee30de60 r6:85d90500 r5:840ad400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee31dfb0 to 0xee31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508180 INFO: task kworker/0:929:8524 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c058a000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:8525 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:8525 tgid:8525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee309d84 r8:00000002 r7:60000013 r6:ee309d8c r5:847e0000 r4:847e0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee309e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e0000 r7:00000000 r6:83018000 r5:00001000 r4:7faff000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf5d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d42b8c r4:85d42800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d42b8c r4:85486980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e0000 r8:854869ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486980 r8:8027ecf4 r7:ee30de60 r6:85486a00 r5:847e0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee309fb0 to 0xee309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508180 INFO: task kworker/0:930:8525 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c0979000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:931:8527 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:931 state:D stack:0 pid:8527 tgid:8527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee321d84 r8:00000002 r7:60000013 r6:ee321d8c r5:857d0000 r4:857d0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee321e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855085c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d0000 r7:00000000 r6:83018000 r5:00001000 r4:7fb01000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edf93000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d42f8c r4:85d42c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d42f8c r4:85486a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d0000 r8:85486aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486a80 r8:8027ecf4 r7:ee30de60 r6:85486b00 r5:857d0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee321fb0 to 0xee321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508500 INFO: task kworker/0:931:8527 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c0979000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:8530 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:8530 tgid:8530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee325d84 r8:00000002 r7:60000113 r6:ee325d8c r5:857d1800 r4:857d1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee325e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855089c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d1800 r7:00000000 r6:83018000 r5:00001000 r4:7fb07000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee039000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4378c r4:85d43400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4378c r4:85486b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d1800 r8:85486bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486b80 r8:8027ecf4 r7:ee30de60 r6:85486c00 r5:857d1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee325fb0 to 0xee325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508440 INFO: task kworker/0:932:8530 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c0b81000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:933:8533 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:933 state:D stack:0 pid:8533 tgid:8533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee305d84 r8:00000002 r7:60000113 r6:ee305d8c r5:857d0c00 r4:857d0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee305e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb09000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d43b8c r4:85d43800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d43b8c r4:85486c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d0c00 r8:85486cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486c80 r8:8027ecf4 r7:ee325e60 r6:85486d00 r5:857d0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee305fb0 to 0xee305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855087c0 INFO: task kworker/0:933:8533 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c0b81000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:934:8536 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:934 state:D stack:0 pid:8536 tgid:8536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee319d84 r8:00000002 r7:60000013 r6:ee319d8c r5:857d3000 r4:857d3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee319e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d3000 r7:00000000 r6:83018000 r5:00001000 r4:7fb0b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0e3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d43f8c r4:85d43c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d43f8c r4:85486d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d3000 r8:85486dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486d80 r8:8027ecf4 r7:ee305e60 r6:85486e00 r5:857d3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee319fb0 to 0xee319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508940 INFO: task kworker/0:934:8536 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c1155000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:8537 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:8537 tgid:8537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee329d84 r8:00000002 r7:60000013 r6:ee329d8c r5:857d3c00 r4:857d3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee329e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeaf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4878c r4:85d48400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4878c r4:85486e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d3c00 r8:85486eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486e80 r8:8027ecf4 r7:ee319e60 r6:85486f00 r5:857d3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee329fb0 to 0xee329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508b40 INFO: task kworker/0:935:8537 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c13c3000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:936:8541 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:936 state:D stack:0 pid:8541 tgid:8541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee331d84 r8:00000002 r7:60000013 r6:ee331d8c r5:857d5400 r4:857d5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee331e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d5400 r7:00000000 r6:83018000 r5:00001000 r4:7fb0d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee0ff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4838c r4:85d48000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4838c r4:85486f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d5400 r8:85486fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85486f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85486f80 r8:8027ecf4 r7:ee329e60 r6:85c1b000 r5:857d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee331fb0 to 0xee331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508e80 INFO: task kworker/0:936:8541 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c16d8000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:8542 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:8542 tgid:8542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee339d84 r8:00000002 r7:60000113 r6:ee339d8c r5:857d6000 r4:857d6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee339e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d6000 r7:00000000 r6:83018000 r5:00001000 r4:7fb11000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee139000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d48f8c r4:85d48c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d48f8c r4:85c1b080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d6000 r8:85c1b0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c1b080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c1b080 r8:8027ecf4 r7:ee329e60 r6:85c1b100 r5:857d6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee339fb0 to 0xee339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508e80 INFO: task kworker/0:937:8542 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c19a5000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:938:8543 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:938 state:D stack:0 pid:8543 tgid:8543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee33dd84 r8:00000002 r7:60000013 r6:ee33dd8c r5:857d6c00 r4:857d6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee33de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af1e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb0f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee123000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d48b8c r4:85d48800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d48b8c r4:85c1b180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d6c00 r8:85c1b1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c1b180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c1b180 r8:8027ecf4 r7:ee339e60 r6:85c1b200 r5:857d6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee33dfb0 to 0xee33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85508e80 INFO: task kworker/0:938:8543 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c1b53000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:939:8546 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:939 state:D stack:0 pid:8546 tgid:8546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee335d84 r8:00000002 r7:60000113 r6:ee335d8c r5:857d4800 r4:857d4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee335e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d4800 r7:00000000 r6:83018000 r5:00001000 r4:7fb13000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee14b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4938c r4:85d49000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4938c r4:85c1b280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d4800 r8:85c1b2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c1b280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c1b280 r8:8027ecf4 r7:ee339e60 r6:85c1b300 r5:857d4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee335fb0 to 0xee335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854eb080 INFO: task kworker/0:939:8546 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c2041000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:940:8548 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:940 state:D stack:0 pid:8548 tgid:8548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee349d84 r8:00000002 r7:60000113 r6:ee349d8c r5:857d2400 r4:857d2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee349e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d2400 r7:00000000 r6:83018000 r5:00001000 r4:7fb15000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4978c r4:85d49400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4978c r4:85c1b380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d2400 r8:85c1b3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c1b380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c1b380 r8:8027ecf4 r7:ee335e60 r6:85c1b400 r5:857d2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee349fb0 to 0xee349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854eb180 INFO: task kworker/0:940:8548 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c2041000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:941:8550 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:941 state:D stack:0 pid:8550 tgid:8550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ee34dd84 r8:00000002 r7:60000113 r6:ee34dd8c r5:847e0c00 r4:847e0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ee34de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eb600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7fb17000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee1fd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d49b8c r4:85d49800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d49b8c r4:85c1b480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e0c00 r8:85c1b4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85c1b480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85c1b480 r8:8027ecf4 r7:ee349e60 r6:85c1b500 r5:847e0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xee34dfb0 to 0xee34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854eb280 INFO: task kworker/0:941:8550 is blocked on a mutex likely owned by task kworker/1:282:5010. task:kworker/1:282 state:R running task stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:855a4800 r8:80200be4 r7:eb5d1d54 r6:ffffffff r5:855a4800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeb5d1d20 to 0xeb5d1d68) 1d20: c23df000 ed5dd000 00000001 80239b98 7f2cd000 00000001 82ac11c4 82ac05a0 1d40: 7f2cd000 ed5dd000 8280c9b4 eb5d1d9c eb5d1da0 eb5d1d70 80230ad4 80239bb0 1d60: 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eb5d1dc0 r5:eb5d1e08 r4:eb5d1dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84de9b8c r4:84de9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84de9b8c r4:8547df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:8547dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8547df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8547df80 r8:8027ecf4 r7:eb5c5e60 r6:85483000 r5:855a4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853f2bc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express Call trace: [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257) r7:00000000 r6:000f0013 r5:600f0093 r4:8225c6a8 [<80201ae4>] (show_stack) from [<80220634>] (__dump_stack lib/dump_stack.c:94 [inline]) [<80201ae4>] (show_stack) from [<80220634>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120) [<802205c4>] (dump_stack_lvl) from [<80220658>] (dump_stack+0x18/0x1c lib/dump_stack.c:129) r5:00000001 r4:00000001 [<80220640>] (dump_stack) from [<81a4fad8>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113) [<81a4f978>] (nmi_cpu_backtrace) from [<81a4fc24>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62) r7:00000001 r6:8280c690 r5:8281afc0 r4:ffffffff [<81a4faf4>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852) r9:8280c80c r8:82ab5564 r7:8281bba8 r6:00007766 r5:8281b588 r4:85eab50c [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80380aa4>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80380aa4>] (check_hung_uninterruptible_tasks kernel/hung_task.c:307 [inline]) [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80380aa4>] (watchdog+0x4a8/0x74c kernel/hung_task.c:470) [<803805fc>] (watchdog) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:803805fc r7:83349780 r6:83349780 r5:83259800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8334c580 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 2817 Comm: pr/ttyAMA0 Not tainted 6.15.0-syzkaller #0 PREEMPT Hardware name: ARM-Versatile Express PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194 LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603 pc : [<81a6f0b4>] lr : [<80a6b27c>] psr: 600c0113 sp : ebd55eb0 ip : ebd55ec0 fp : ebd55ebc r10: 8295a7c4 r9 : 00000000 r8 : 00000000 r7 : 00000117 r6 : 8295a728 r5 : 00000000 r4 : 00000001 r3 : 0000ed6c r2 : 00000000 r1 : 600c0113 r0 : 83a42040 Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84441dc0 DAC: fffffffd Call trace: [<81a6f08c>] (_raw_spin_unlock_irqrestore) from [<80a6b27c>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]) [<81a6f08c>] (_raw_spin_unlock_irqrestore) from [<80a6b27c>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]) [<81a6f08c>] (_raw_spin_unlock_irqrestore) from [<80a6b27c>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603) [<80a6b25c>] (pl011_console_device_unlock) from [<802e7e2c>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123) [<802e7dac>] (nbcon_emit_one) from [<802e804c>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210) r6:8280c690 r5:844c9800 r4:8295a728 [<802e7ea4>] (nbcon_kthread_func) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8295a728 r8:802e7ea4 r7:8441cc00 r6:8441cc00 r5:844c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd55fb0 to 0xebd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8386c400